Windows Analysis Report
qk9TaBBxh8.exe

Overview

General Information

Sample name: qk9TaBBxh8.exe
renamed because original name is a hash value
Original sample name: cb4118382e3f97f0db04938a4e31e3e1.exe
Analysis ID: 1429030
MD5: cb4118382e3f97f0db04938a4e31e3e1
SHA1: d31dff9e56df945247cbb0598bf0c1d27aedcccf
SHA256: fcd465bfb29ad1ee9c3344c27035fe6721f7c634ae714db808454b2d14e6ecd3
Tags: 64exePrivateLoadertrojan
Infos:

Detection

LummaC, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected Glupteba
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Stealc
Yara detected Vidar stealer
Yara detected zgRAT
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a Chrome extension
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Windows Defender Exclusions Added - Registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
query blbeacon for getting browser version

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Glupteba Glupteba is a trojan horse malware that is one of the top ten malware variants of 2021. After infecting a system, the Glupteba malware can be used to deliver additional malware, steal user authentication information, and enroll the infected system in a cryptomining botnet. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.glupteba
Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
Name Description Attribution Blogpost URLs Link
SmokeLoader The SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader

AV Detection

barindex
Source: C:\ProgramData\MPGPH131\MPGPH131.exe Avira: detection malicious, Label: HEUR/AGEN.1361904
Source: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe Avira: detection malicious, Label: TR/AD.Nekark.sbdpe
Source: 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: StealC {"C2 url": "http://185.172.128.23/f993692117a3fda2.php"}
Source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://nidoe.org/tmp/index.php", "http://sodez.ru/tmp/index.php", "http://uama.com.ua/tmp/index.php", "http://talesofpirates.net/tmp/index.php"]}
Source: 0000000F.00000003.2405630696.0000000001C00000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Vidar {"C2 url": "http://185.172.128.23/f993692117a3fda2.php"}
Source: 29.2.RegAsm.exe.400000.0.unpack Malware Configuration Extractor: RedLine {"C2 url": ["5.42.65.50:33080"], "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
Source: http://193.233.132.139/dacha/rules.exe Virustotal: Detection: 25% Perma Link
Source: http://185.172.128.23/8e6d9db21fb63946/nss3.dll Virustotal: Detection: 19% Perma Link
Source: http://185.172.128.23/f993692117a3fda2.phpt Virustotal: Detection: 16% Perma Link
Source: http://185.172.128.23/8e6d9db21fb63946/mozglue.dll Virustotal: Detection: 7% Perma Link
Source: http://185.172.128.23/8e6d9db21fb63946/sqlite3.dll Virustotal: Detection: 19% Perma Link
Source: http://sodez.ru/tmp/index.php Virustotal: Detection: 20% Perma Link
Source: https://triedchicken.net:80/cad54ba5b01423b1af8ec10ab5719d97.exe Virustotal: Detection: 5% Perma Link
Source: http://193.233.132.253/lumma1504.exe Virustotal: Detection: 22% Perma Link
Source: http://5.42.66.10/download/th/retail.phphps Virustotal: Detection: 19% Perma Link
Source: http://uama.com.ua/tmp/index.php Virustotal: Detection: 17% Perma Link
Source: https://monoblocked.com/525403/setup.exexe Virustotal: Detection: 12% Perma Link
Source: https://carthewasher.net/ Virustotal: Detection: 15% Perma Link
Source: https://monoblocked.com/ Virustotal: Detection: 15% Perma Link
Source: http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll Virustotal: Detection: 7% Perma Link
Source: https://monoblocked.com/525403/setup.exe Virustotal: Detection: 13% Perma Link
Source: https://baldurgatez.com/7725eaa6592c80f8124e769b4e8a07f7.exexe Virustotal: Detection: 9% Perma Link
Source: http://talesofpirates.net/tmp/index.php Virustotal: Detection: 17% Perma Link
Source: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe ReversingLabs: Detection: 91%
Source: C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe ReversingLabs: Detection: 87%
Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\AdobeUpdaterV202.exe ReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\Retailer_prog[1].exe ReversingLabs: Detection: 31%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\123p[1].exe ReversingLabs: Detection: 87%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\Space_bake[1].exe ReversingLabs: Detection: 30%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\Default16_team[1].exe ReversingLabs: Detection: 70%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\cad54ba5b01423b1af8ec10ab5719d97[1].exe ReversingLabs: Detection: 43%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\grabber[1].exe ReversingLabs: Detection: 26%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\lumma1504[1].exe ReversingLabs: Detection: 91%
Source: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\Install.exe ReversingLabs: Detection: 34%
Source: qk9TaBBxh8.exe ReversingLabs: Detection: 36%
Source: qk9TaBBxh8.exe Virustotal: Detection: 25% Perma Link
Source: Yara match File source: 17.1.tXlQ3NLbQqxBkFS_TfaDHWX4.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000011.00000001.2435771287.0000000000843000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: C:\ProgramData\MPGPH131\MPGPH131.exe Joe Sandbox ML: detected
Source: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe Joe Sandbox ML: detected
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: INSERT_KEY_HERE
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetProcAddress
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: LoadLibraryA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: lstrcatA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: OpenEventA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateEventA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CloseHandle
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Sleep
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetUserDefaultLangID
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: VirtualAllocExNuma
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: VirtualFree
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetSystemInfo
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: VirtualAlloc
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HeapAlloc
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetComputerNameA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: lstrcpyA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetProcessHeap
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetCurrentProcess
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: lstrlenA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ExitProcess
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GlobalMemoryStatusEx
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetSystemTime
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SystemTimeToFileTime
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: advapi32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: gdi32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: user32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: crypt32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ntdll.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetUserNameA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateDCA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetDeviceCaps
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ReleaseDC
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CryptStringToBinaryA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sscanf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: VMwareVMware
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HAL9TH
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: JohnDoe
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DISPLAY
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %hu/%hu/%hu
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: http://185.172.128.23
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: /f993692117a3fda2.php
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: /8e6d9db21fb63946/
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: default9
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetEnvironmentVariableA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetFileAttributesA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GlobalLock
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HeapFree
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetFileSize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GlobalSize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateToolhelp32Snapshot
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: IsWow64Process
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Process32Next
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetLocalTime
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: FreeLibrary
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetTimeZoneInformation
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetSystemPowerStatus
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetVolumeInformationA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetWindowsDirectoryA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Process32First
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetLocaleInfoA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetUserDefaultLocaleName
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetModuleFileNameA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DeleteFileA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: FindNextFileA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: LocalFree
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: FindClose
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SetEnvironmentVariableA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: LocalAlloc
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetFileSizeEx
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ReadFile
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SetFilePointer
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: WriteFile
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateFileA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: FindFirstFileA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CopyFileA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: VirtualProtect
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetLogicalProcessorInformationEx
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetLastError
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: lstrcpynA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: MultiByteToWideChar
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GlobalFree
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: WideCharToMultiByte
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GlobalAlloc
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: OpenProcess
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: TerminateProcess
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetCurrentProcessId
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: gdiplus.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ole32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: bcrypt.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: wininet.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: shlwapi.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: shell32.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: psapi.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: rstrtmgr.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateCompatibleBitmap
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SelectObject
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BitBlt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DeleteObject
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateCompatibleDC
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipGetImageEncodersSize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipGetImageEncoders
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipCreateBitmapFromHBITMAP
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdiplusStartup
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdiplusShutdown
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipSaveImageToStream
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipDisposeImage
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GdipFree
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetHGlobalFromStream
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CreateStreamOnHGlobal
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CoUninitialize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CoInitialize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CoCreateInstance
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptGenerateSymmetricKey
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptCloseAlgorithmProvider
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptDecrypt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptSetProperty
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptDestroyKey
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: BCryptOpenAlgorithmProvider
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetWindowRect
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetDesktopWindow
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetDC
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CloseWindow
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: wsprintfA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: EnumDisplayDevicesA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetKeyboardLayoutList
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CharToOemW
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: wsprintfW
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RegQueryValueExA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RegEnumKeyExA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RegOpenKeyExA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RegCloseKey
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RegEnumValueA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CryptBinaryToStringA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CryptUnprotectData
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SHGetFolderPathA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ShellExecuteExA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetOpenUrlA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetConnectA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetCloseHandle
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetOpenA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HttpSendRequestA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HttpOpenRequestA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetReadFile
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: InternetCrackUrlA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: StrCmpCA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: StrStrA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: StrCmpCW
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PathMatchSpecA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: GetModuleFileNameExA
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RmStartSession
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RmRegisterResources
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RmGetList
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: RmEndSession
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_open
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_prepare_v2
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_step
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_column_text
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_finalize
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_close
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_column_bytes
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3_column_blob
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: encrypted_key
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PATH
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: C:\ProgramData\nss3.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: NSS_Init
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: NSS_Shutdown
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PK11_GetInternalKeySlot
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PK11_FreeSlot
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PK11_Authenticate
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: PK11SDR_Decrypt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: C:\ProgramData\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT origin_url, username_value, password_value FROM logins
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: browser:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: profile:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: url:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: login:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: password:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Opera
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: OperaGX
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Network
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: cookies
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: .txt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: TRUE
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: FALSE
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: autofill
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT name, value FROM autofill
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: history
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT url FROM urls LIMIT 1000
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: name:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: month:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: year:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: card:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Cookies
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Login Data
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Web Data
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: History
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: logins.json
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: formSubmitURL
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: usernameField
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: encryptedUsername
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: encryptedPassword
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: guid
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT fieldname, value FROM moz_formhistory
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SELECT url FROM moz_places LIMIT 1000
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: cookies.sqlite
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: formhistory.sqlite
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: places.sqlite
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: plugins
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Local Extension Settings
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Sync Extension Settings
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: IndexedDB
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Opera Stable
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Opera GX Stable
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: CURRENT
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: chrome-extension_
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: _0.indexeddb.leveldb
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Local State
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: profiles.ini
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: chrome
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: opera
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: firefox
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: wallets
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %08lX%04lX%lu
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ProductName
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %d/%d/%d %d:%d:%d
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ProcessorNameString
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DisplayName
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DisplayVersion
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Network Info:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - IP: IP?
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Country: ISO?
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: System Summary:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - HWID:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - OS:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Architecture:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - UserName:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Computer Name:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Local Time:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - UTC:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Language:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Keyboards:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Laptop:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Running Path:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - CPU:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Threads:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Cores:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - RAM:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - Display Resolution:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: - GPU:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: User Agents:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Installed Apps:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: All Users:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Current User:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Process List:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: system_info.txt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: freebl3.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: mozglue.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: msvcp140.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: nss3.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: softokn3.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: vcruntime140.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Temp\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: .exe
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: runas
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: open
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: /c start
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %DESKTOP%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %APPDATA%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %LOCALAPPDATA%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %USERPROFILE%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %DOCUMENTS%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %PROGRAMFILES%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %PROGRAMFILES_86%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: %RECENT%
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: *.lnk
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: files
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \discord\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Local Storage\leveldb\CURRENT
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Local Storage\leveldb
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Telegram Desktop\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: key_datas
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: D877F783D5D3EF8C*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: map*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: A7FDF864FBC10B77*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: A92DAA6EA6F891F2*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: F8806DD0C461824F*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Telegram
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: *.tox
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: *.ini
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Password
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: 00000001
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: 00000002
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: 00000003
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: 00000004
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Outlook\accounts.txt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Pidgin
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \.purple\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: accounts.xml
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: dQw4w9WgXcQ
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: token:
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Software\Valve\Steam
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: SteamPath
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \config\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ssfn*
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: config.vdf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DialogConfig.vdf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: DialogConfigOverlay*.vdf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: libraryfolders.vdf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: loginusers.vdf
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Steam\
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: sqlite3.dll
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: browsers
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: done
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: soft
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: \Discord\tokens.txt
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: /c timeout /t 5 & del /f /q "
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: " & del "C:\ProgramData\*.dll"" & exit
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: C:\Windows\system32\cmd.exe
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: https
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Content-Type: multipart/form-data; boundary=----
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: POST
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: HTTP/1.1
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: Content-Disposition: form-data; name="
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: hwid
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: build
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: token
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: file_name
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: file
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: message
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
Source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack String decryptor: screenshot.jpg
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0D9D0 CryptAcquireContextA,GetLastError, 10_2_69B0D9D0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0DBB0 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8, 10_2_69B0DBB0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0DD20 CryptReleaseContext, 10_2_69B0DD20
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0DEE0 CryptReleaseContext, 10_2_69B0DEE0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0DE00 CryptGenRandom,__CxxThrowException@8, 10_2_69B0DE00
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B335E0 CryptReleaseContext, 10_2_69B335E0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0D7F0 CryptReleaseContext, 10_2_69B0D7F0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B0D7D4 CryptReleaseContext, 10_2_69B0D7D4

Bitcoin Miner

barindex
Source: Yara match File source: 17.1.tXlQ3NLbQqxBkFS_TfaDHWX4.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000011.00000001.2435771287.0000000000843000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY

Compliance

barindex
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Unpacked PE file: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Windows\SysWOW64\msvcr100.dll
Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbW source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdbP@n@ `@_CorExeMainmscoree.dll source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DCD000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2718547054.0000000069B34000.00000002.00000001.01000000.00000021.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2693560746.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004AC8000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DCD000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\laracu valo35\tag\ped\kixe\vevuyohiyiva_yicofok.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D70232C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128070226.000001D702377000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D702356000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127511693.000001D702218000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126674447.000001D7021F6000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D702377000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdb source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000003.2613298063.000001DB77B90000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2622806676.000000C0000AC000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000266000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D7023E9000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127896153.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126643406.000001D70224D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128179905.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, T9n2wvLQ1PO2GfTxLTyp21hE.exe, 0000000E.00000002.2520477544.00000000002F9000.00000002.00000001.01000000.0000000D.sdmp, T9n2wvLQ1PO2GfTxLTyp21hE.exe, 0000000E.00000000.2397254577.00000000002F9000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbEMP source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: zFe0EAtgy56yDxXht4nmozfb.exe, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928592869.0000000000B39000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000001.2521718747.00000000002F0000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\vuhuyiwulumopo62_soba.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2132642581.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127967224.000001D7021F5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134526384.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128255759.000001D702217000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2138129759.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2136306601.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130037595.000001D702217000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2129915477.000001D7021B0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142101955.000001D7027FE000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2132761360.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Moq.pdbSHA256@ source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\sehuxi\gukulow\tulatesati\wudapul-rarupi.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2142363047.000001D702353000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2145509043.000001D703B50000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141999180.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2149442634.000001D704113000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142230053.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2143104056.000001D702988000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142675803.000001D702495000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2145072174.000001D703403000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141838147.000001D70224D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2146166478.000001D703DAA000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142453918.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\sc-client\Jenkins\workspace\WindowsBuild\SecureConnectClient\ACVC.Core\obj\WinRelease\netstandard2.0\AWSVPNClient.Core.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000003.2613298063.000001DB77B90000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2622806676.000000C0000AC000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000266000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: Moq.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\projects\polly\src\Polly.Net45\obj\Release\net45\Polly.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2471533821.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbV source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Temp\Json\Working\Newtonsoft.Json\Src\Newtonsoft.Json\obj\Release\Newtonsoft.Json.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: uic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583230702.0000000001538000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2472974179.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DD8000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\projects\polly\src\Polly.Net45\obj\Release\net45\Polly.pdbjz source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2448673035.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdboF source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb,ANA @A_CorExeMainmscoree.dll source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DD8000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2472336262.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2469992759.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbh source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\sc-client\Jenkins\workspace\WindowsBuild\SecureConnectClient\ACVC.Core\obj\WinRelease\netstandard2.0\AWSVPNClient.Core.pdbSHA256 source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbeIn source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.PDB source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583230702.0000000001538000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.PDB source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2693560746.0000000005FAA000.00000004.08000000.00040000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004B84000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.00000000049F9000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: 453C:\laracu valo35\tag\ped\kixe\vevuyohiyiva_yicofok.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D70232C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128070226.000001D702377000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D702356000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127511693.000001D702218000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126674447.000001D7021F6000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D702377000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2448940390.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp

Change of critical system settings

barindex
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_Extensions Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exe Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_Extensions
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exe
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A7B1CB FindFirstFileExW,GetLastError, 7_2_00A7B1CB
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009AB300 FindFirstFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error, 7_2_009AB300
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6940
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 10_2_05CD5565
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6939
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 10_2_05CDD480
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6C69
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 10_2_05CDD478
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6C70
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then jmp 05CDD06Ah 10_2_05CDCFB8
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then jmp 05CDD06Ah 10_2_05CDCFB0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6B58
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6B60
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h 10_2_05CD36DC
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 10_2_05CDCED7
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6A48
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 4x nop then mov dword ptr [ebp-14h], 40000003h 10_2_05CD6A50

Networking

barindex
Source: C:\Windows\explorer.exe Network Connect: 102.53.9.151 80
Source: Malware configuration extractor URLs: http://185.172.128.23/f993692117a3fda2.php
Source: Malware configuration extractor URLs: http://185.172.128.23/f993692117a3fda2.php
Source: Malware configuration extractor URLs: http://nidoe.org/tmp/index.php
Source: Malware configuration extractor URLs: http://sodez.ru/tmp/index.php
Source: Malware configuration extractor URLs: http://uama.com.ua/tmp/index.php
Source: Malware configuration extractor URLs: http://talesofpirates.net/tmp/index.php
Source: Malware configuration extractor URLs: 5.42.65.50:33080
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: dCIjUPk4HQDvWsTSBTjdtIZC.exe.0.dr
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: aniSiiwr9ACMsStraaf0y6pm.exe.0.dr
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009BE220 recv,setsockopt,recv,WSAGetLastError,recv,recv,setsockopt,recv,recv,recv,__Xtime_get_ticks,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,Sleep,Sleep, 7_2_009BE220
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://r.mradx.net https://ton.twimg.com https://tagmanager.google.com https://platform.twitter.com https://*.googleapis.com 'self' 'unsafe-inline';report-uri /csp equals www.facebook.com (Facebook)
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://r.mradx.net https://ton.twimg.com https://tagmanager.google.com https://platform.twitter.com https://*.googleapis.com 'self' 'unsafe-inline';report-uri /csp equals www.twitter.com (Twitter)
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src * data: blob: about: vkcalls:;script-src 'self' https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://*.mail.ru https://r.mradx.net https://s.ytimg.com https://platform.twitter.com https://cdn.syndication.twimg.com https://www.instagram.com https://connect.facebook.net https://telegram.org https://*.yandex.ru https://*.google-analytics.com https://*.youtube.com https://maps.googleapis.com https://translate.googleapis.com https://*.google.com https://google.com https://*.vkpartner.ru https://*.moatads.com https://*.adlooxtracking.ru https://*.serving-sys.ru https://*.weborama-tech.ru https://*.gstatic.com https://*.google.ru https://securepubads.g.doubleclick.net https://cdn.ampproject.org https://www.googletagmanager.com https://googletagmanager.com https://*.vk-cdn.net https://*.hit.gemius.pl https://yastatic.net https://analytics.tiktok.com 'unsafe-inline' 'unsafe-eval' blob:;style-src https://vk.com https://*.vk.com https://vk.ru https://*.vk.ru https://static.vk.me https://r.mradx.net https://ton.twimg.com https://tagmanager.google.com https://platform.twitter.com https://*.googleapis.com 'self' 'unsafe-inline';report-uri /csp equals www.youtube.com (Youtube)
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://127.0.0.1:
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.203/dl.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.203/dl.phpL
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022158722.0000000001CAE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/freebl3.dll/Li
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/freebl3.dll3Mu
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/mozglue.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/mozglue.dllOMI
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/msvcp140.dllkM-
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/nss3.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/softokn3.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/softokn3.dll=MG
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/softokn3.dllgL
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/sqlite3.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/sqlite3.dllYM
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/sqlite3.dllt
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/vcruntime140.dll
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/8e6d9db21fb63946/vcruntime140.dllRE
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/f993692117a3fda2.php
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000549000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: http://185.172.128.23/f993692117a3fda2.phpb36fd1cef167f046e714b525b44eclt-release2949fc6aa0d2f9ea88e
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/f993692117a3fda2.phpt
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23/f993692117a3fda2.phptop
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022158722.0000000001CAE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.172.128.23S
Source: qk9TaBBxh8.exe, 00000000.00000003.2141201425.000001D702104000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://193.233.132.139/dacha/rules.exe
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935186807.0000000006678000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935510140.0000000006790000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://193.233.132.253/lumma1504.exe
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.00000000019C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://193.233.132.253/lumma1504.exe0
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.00000000019C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://193.233.132.253/lumma1504.exeH
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/123p.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/123p.exe.203/dl.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/123p.exe6
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/123p.exej
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EE9000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/getimage16.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/getimage16.php.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175216899.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167397049.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/getimage16.php?
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175216899.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167397049.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/getimage16.phpV
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175216899.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167397049.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/getimage16.phpY
Source: qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/retail.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/retail.php16.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/retail.phphps
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/retail.phpx
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/space.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/space.phpJ
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.66.10/download/th/space.phpb
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/IsAliveResponse
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/IsAliveT
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StartResponse
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StartT
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StopResponseR
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StopT
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ACVC.WPF.Service.WcfT
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2Assure
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssureZ
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiC
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCM
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCZ
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://james.newtonking.com/projects/json
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0N
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0O
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: http://ocsp.digicert.com0X
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169190202.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167052907.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wikkt.com/forum/index.php
Source: qk9TaBBxh8.exe, 00000000.00000003.2169190202.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167052907.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021A0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wikkt.com/forum/index.php-
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wikkt.com/forum/index.phpK
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468996555.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/CPS0
Source: qk9TaBBxh8.exe, 00000000.00000003.2129915477.000001D702263000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2132941283.000001D70220C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130108191.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2132642581.000001D70230A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2132761360.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2129915477.000001D7021D9000.00000004.00000020.00020000.00000000.sdmp, TUBbflj40zqtNIEKWH_MWjeG.exe, 00000012.00000000.2397793800.0000000000410000.00000002.00000001.01000000.00000011.sdmp String found in binary or memory: http://www.innosetup.com
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928161171.0000000000AB6000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2816985403.0000000000255000.00000002.00000001.01000000.0000000C.sdmp String found in binary or memory: http://www.winimage.com/zLibDll
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928161171.0000000000AB6000.00000040.00000001.01000000.00000006.sdmp String found in binary or memory: http://www.winimage.com/zLibDllDp
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2816985403.0000000000255000.00000002.00000001.01000000.0000000C.sdmp String found in binary or memory: http://www.winimage.com/zLibDllDp&Tp&
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://analytics.tiktok.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aui-cdn.atlassian.com/
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://baldurgatez.com/
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://baldurgatez.com/7725eaa6592c80f8124e769b4e8a07f7.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://baldurgatez.com/7725eaa6592c80f8124e769b4e8a07f7.exexe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://baldurgatez.com/~
Source: qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://baldurgatez.com:80/7725eaa6592c80f8124e769b4e8a07f7.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2130037595.000001D702241000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126739049.000001D70218A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/8b0be658-c958-47a3-96e4-fc8e5fe7c5dc/downloads/dc50f97b-477f-
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/gs
Source: qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/superworkspacenb/gerge/downloads/grabber.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/superworkspacenb/gerge/downloads/grabber.exeU
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org:80/superworkspacenb/gerge/downloads/grabber.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://c.574859385.xyz/
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://c.574859385.xyz/525403/setup.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://c.574859385.xyz/b
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://carthewasher.net/
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://carthewasher.net/R
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://carthewasher.net/fbdd1d2f6f7fd732cbea599f111537fe/cad54ba5b01423b1af8ec10ab5719d97.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EE7000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://carthewasher.net/fbdd1d2f6f7fd732cbea599f111537fe/cad54ba5b01423b1af8ec10ab5719d97.exed97.ex
Source: qk9TaBBxh8.exe, 00000000.00000003.2141201425.000001D7020E9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://carthewasher.net/fbdd1d2f6f7fd732cbea599f111537fe/cad54ba5b01423b1af8ec10ab5719d97.exejd
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ampproject.org
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.cookielaw.org/
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.syndication.twimg.com
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://connect.facebook.net
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.00000000019C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/A
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.57.52
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.00000000019C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.57.52k
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000196A000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com:443/demo/home.php?s=81.181.57.52
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://dev.vk.com
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://gigachadfanclub.org/
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701EFD000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EFD000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701EFD000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130154518.000001D7020FE000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701EF8000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134929615.000001D7020FC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701EFD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://gigachadfanclub.org/fbdd1d2f6f7fd732cbea599f111537fe/7725eaa6592c80f8124e769b4e8a07f7.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F02000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://gigachadfanclub.org/fbdd1d2f6f7fd732cbea599f111537fe/7725eaa6592c80f8124e769b4e8a07f7.exebe
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2448128572.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/mhammond/pywin32
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: https://github.com/moq/moq4
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://google.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://googletagmanager.com
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.0000000001979000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/Mozilla/5.0
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001357000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/d=
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928161171.0000000000AB6000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2816985403.0000000000255000.00000002.00000001.01000000.0000000C.sdmp String found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001321000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/sW
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000194B000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.000000000133A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/widget/demo/81.181.57.52
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.0000000001979000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/widget/demo/81.181.57.52$a
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.0000000001979000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io:443/widget/demo/81.181.57.52
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io:443/widget/demo/81.181.57.52.
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe String found in binary or memory: https://login.chinacloudapi.cn/crypto/aes:
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://login.microsoftonline.com/crypto/rc4:
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe String found in binary or memory: https://login.microsoftonline.us/scalar
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.vk.com/
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.vk.com/?act=login
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.vk.com/?act=logout&hash=b823d72190fa28b755&_origin=https%3A%2F%2Fvk.com&lrt=BDpxh3TFcr
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://management.azure.cominvalid
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://management.chinacloudapi.cnP224
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://management.core.chinacloudapi.cnchacha20poly1305:
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://management.core.usgovcloudapi.netGODEBUG
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2776004100.00007FF6359C9000.00000002.00000001.01000000.0000000B.sdmp String found in binary or memory: https://management.usgovcloudapi.nethttps://management.core.windows.net/edwards25519:
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://maps.googleapis.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/F
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/Z
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/style/060.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/style/060.exe16.phpF
Source: qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/style/060.exeD
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/style/060.exephp
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top/style/060.exes.top/
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://meet.crazyfigs.top:80/style/060.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://monoblocked.com/
Source: qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://monoblocked.com/525403/setup.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://monoblocked.com/525403/setup.exeom/
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://monoblocked.com/525403/setup.exexe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://monoblocked.com:80/525403/setup.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs/
Source: qk9TaBBxh8.exe, 00000000.00000003.2133663823.000001D702104000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs/lander/File_294/setup294.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs/lander/File_294/setup294.exeS
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs/lander/File_294/setup294.exeexe
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs:80/lander/File_294/setup294.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://palberryslicker.sbs:80/lander/File_294/setup294.exe;
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://papi.vk.com/pushsse/ruim
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://platform.twitter.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://r.mradx.net
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://s.ytimg.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://securepubads.g.doubleclick.net
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021AC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/base.7c74f023.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021AC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/common.1545e5c6.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021AC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/fonts_cnt.c7a76efe.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021AC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/fonts_utf.7fa94ada.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/ui_common.4135db2f.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/uncommon.6d51982c.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/vk_sans_display.5625d45f.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/vk_sans_display_faux.7d208ecb.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021AC000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/al/vkui.43318ab6.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169190202.000001D70219B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/fonts/VKSansDisplayDemiBold
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/css/fonts/VKSansDisplayDemiBoldFaux.v100.woff2
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/audioplayer-lib.5f2a5c5d.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/audioplayer-lib.93b52d88.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/common.1a9638fd.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/react.759f82b6.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/state-management.c22f9f68.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/vkcom-kit-icons.826b9222.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/vkcom-kit.342340af.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/vkcom-kit.385e5148.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/chunks/vkui.847cc706.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/common_web.9d09fc5d.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/common_web.bb0c1fad.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/css_types.1bff1a5b.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/docs.20074c02.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/docs.819ef167.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/error_monitoring.isolated.3df2967b.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/grip.0b3b493f.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/jobs_devtools_notification.14f96f02.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/likes.08bf71a4.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/likes.20074c02.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/page_layout.7b5800c2.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/performance_observers.4d12f60f.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/polyfills.isolated.edaffb7b.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/raven_logger.ea0a2239.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/site_layout.20074c02.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/site_layout.625c2925.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/ui_common.20074c02.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/ui_common.b828980c.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/unauthorized.20074c02.css
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/unauthorized.f646a9e2.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2175170227.000001D702275000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174809957.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://st6-23.vk.com/dist/web/vk_sans_observer.fb28db65.js
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://static.vk.me
Source: qk9TaBBxh8.exe, 00000000.00000003.2169098487.000001D70226D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70226C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D7021B5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D702273000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2169327203.000001D70213F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://stats.vk-portal.net
Source: FSYOvyvMMT80PCsMousFK1Xa.exe, 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888
Source: FSYOvyvMMT80PCsMousFK1Xa.exe, 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888ve74rMozilla/5.0
Source: qk9TaBBxh8.exe, 00000000.00000003.2169190202.000001D7021A8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sun6-21.userapi.com/c236331/u5294803/docs/d24/ef46b35f8bf1/imgdrive_2_1.bmp?extra=bkM2v2_xSr
Source: qk9TaBBxh8.exe, 00000000.00000003.2175246907.000001D7021A8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sun6-22.userapi.com/c909518/u5294803/docs/d23/f3f574557e5d/crypted.bmp?extra=OZKsfqLr82JxeKr
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.00000000013BC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.I
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000198D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.X0
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.00000000012EE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/RiseProSUPPORT
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.00000000012EE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/RiseProSUPPORT_IDENTIFIER=Intel64
Source: FSYOvyvMMT80PCsMousFK1Xa.exe, 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp String found in binary or memory: https://t.me/irfail
Source: FSYOvyvMMT80PCsMousFK1Xa.exe, 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp String found in binary or memory: https://t.me/irfailAt
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_bot
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.00000000019C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_bot.52nia
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_boteriSign
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://tagmanager.google.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://telegram.org
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ton.twimg.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://translate.googleapis.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://triedchicken.net/
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://triedchicken.net/cad54ba5b01423b1af8ec10ab5719d97.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://triedchicken.net/cad54ba5b01423b1af8ec10ab5719d97.exe3
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://triedchicken.net/cad54ba5b01423b1af8ec10ab5719d97.exep
Source: qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F42000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F42000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://triedchicken.net:80/cad54ba5b01423b1af8ec10ab5719d97.exe
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2623125717.0000000003331000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://urn.to/r/sds_see
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/browser_reports?dest=default_reports
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc329118071_676580549?hash=pFVdCz3lOS502jpZ4S1mZuaA9EuN2MatBz9F2cxg7Ac&dl=ej7ecTKnt3
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc5294803_668627934?hash=KOcSmbd2hjdTG4DLhdJgoCSrHOpCJeuTNRte86dnj0k&dl=iwW1iFTFzY3z
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc5294803_668652542?hash=KlAQZ4zXtzzV5eLSZ1KaXKdCOpfsWxOfH5GyV92XrPL&dl=yPhjzrub8w5M
Source: qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc5294803_668769608?hash=EJK4IigrO9hmPOkFxXqpLliN8ksP1vifJqKZbhFKHvw&dl=HyyWNdLGIElg
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc5294803_668771194?hash=7dzZFNgNMhFnf8UKhZ88SSJWzznhZJIEKWOI1nQNlbw&dl=jwd31UuZgmzf
Source: qk9TaBBxh8.exe, 00000000.00000003.2167698136.000001D701F29000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com/doc5294803_668776833?hash=0O6PF91bZH66jRdVdr0Yhs0vV73FDPMFrSckqwaaZuH&dl=PH90vp0b08Gc
Source: qk9TaBBxh8.exe, 00000000.00000003.2141347536.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118393401.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2135410810.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2140953938.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2118542305.000001D701F0E000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134794548.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2133898149.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2167644651.000001D701F18000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141954361.000001D701F12000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130431909.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.com:80/doc5294803_668771194?hash=7dzZFNgNMhFnf8UKhZ88SSJWzznhZJIEKWOI1nQNlbw&dl=jwd31UuZg
Source: qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://vk.ru
Source: qk9TaBBxh8.exe, 00000000.00000003.2127220108.000001D701F0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2452855135.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2465996225.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2457158395.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449377666.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449563727.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468746507.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450463415.0000022634F28000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468946975.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2451130803.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449434243.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2450640619.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468795113.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2449615473.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468664100.0000022634F2A000.00000004.00000020.00020000.00000000.sdmp, Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2468605258.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2823051341.0000000006798000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2806766200.00000000066C8000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2804433882.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2805132778.0000000006240000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801816472.0000000006201000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000003.2539258847.0000000001D78000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.googletagmanager.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.instagram.com
Source: zFe0EAtgy56yDxXht4nmozfb.exe String found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: https://www.mozilla.org/about/P.exe
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: https://www.mozilla.org/about/t.exe
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp String found in binary or memory: https://www.security.us.panasonic.com
Source: qk9TaBBxh8.exe, 00000000.00000003.2174961511.000001D70224A000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2168846358.000001D70224A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://yastatic.net

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.2724393718.0000000003961000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

E-Banking Fraud

barindex
Source: Yara match File source: 17.1.tXlQ3NLbQqxBkFS_TfaDHWX4.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000011.00000001.2435771287.0000000000843000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\TmpFEA6.tmp Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\TmpFE95.tmp Jump to dropped file

System Summary

barindex
Source: 28.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects Hidden Cobra BANKSHOT trojan Author: Florian Roth
Source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE Matched rule: Detects zgRAT Author: ditekSHen
Source: 00000017.00000002.2716540059.0000000001AFF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000017.00000002.2719169995.0000000003650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 0000000F.00000002.3022350261.0000000001CBF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000017.00000002.2724393718.0000000003961000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 0000001C.00000002.2938091738.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects Hidden Cobra BANKSHOT trojan Author: Florian Roth
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED Matched rule: Detects zgRAT Author: ditekSHen
Source: lumma1504[1].exe.7.dr, RemoteObjects.cs Large array initialization: RemoteObjects: array initializer size 307200
Source: JpL3YVeZ0uQ2FWGpg5WG.exe.7.dr, RemoteObjects.cs Large array initialization: RemoteObjects: array initializer size 307200
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: Space_bake[1].exe.0.dr Static PE information: section name: 8<&>8<&>
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: 8<&>8<&>
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: 8<&>8<&>
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: 8<&>8<&>
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CDD590 NtUnmapViewOfSection, 10_2_05CDD590
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CDD58B NtUnmapViewOfSection, 10_2_05CDD58B
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Windows\System32\GroupPolicy\gpt.ini Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Windows\System32\GroupPolicy\Machine Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Windows\System32\GroupPolicy\User Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Windows\System32\GroupPolicy\Machine\Registry.pol Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Windows\SysWOW64\GroupPolicy\gpt.ini
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A8925D 7_2_00A8925D
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009AC490 7_2_009AC490
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009FA490 7_2_009FA490
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009FB4B0 7_2_009FB4B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009F64A0 7_2_009F64A0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A36450 7_2_00A36450
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009F8520 7_2_009F8520
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009DB750 7_2_009DB750
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009D8770 7_2_009D8770
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009D78A0 7_2_009D78A0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009DC800 7_2_009DC800
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009E2940 7_2_009E2940
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009D9A80 7_2_009D9A80
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009CEB90 7_2_009CEB90
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009D4B20 7_2_009D4B20
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009FCC40 7_2_009FCC40
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009ABFC0 7_2_009ABFC0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 7_2_00CA00C2
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A2E040 7_2_00A2E040
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9B02C 7_2_00C9B02C
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CC0020 7_2_00CC0020
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A30100 7_2_00A30100
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009EC160 7_2_009EC160
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A285 7_2_00C9A285
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A27270 7_2_00A27270
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F3FC 7_2_00C9F3FC
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A803D0 7_2_00A803D0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A359 7_2_00C9A359
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A1F360 7_2_00A1F360
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B6490 7_2_009B6490
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A344E0 7_2_00A344E0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9948F 7_2_00C9948F
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009A2410 7_2_009A2410
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F452 7_2_00C9F452
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C97462 7_2_00C97462
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA1473 7_2_00CA1473
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C98403 7_2_00C98403
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A23470 7_2_00A23470
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A8959F 7_2_00A8959F
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9850F 7_2_00C9850F
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA153B 7_2_00CA153B
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A12630 7_2_00A12630
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009A2600 7_2_009A2600
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A2F7B0 7_2_00A2F7B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009AE7B0 7_2_009AE7B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A10760 7_2_00A10760
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009D3740 7_2_009D3740
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A11830 7_2_00A11830
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9B877 7_2_00C9B877
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A9B84F 7_2_00A9B84F
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009BF9B0 7_2_009BF9B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A9D9FE 7_2_00A9D9FE
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C97930 7_2_00C97930
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C97A49 7_2_00C97A49
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9BA4C 7_2_00C9BA4C
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A21A30 7_2_00A21A30
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009EEB90 7_2_009EEB90
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A85B90 7_2_00A85B90
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA0B7D 7_2_00CA0B7D
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A83B58 7_2_00A83B58
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA0C82 7_2_00CA0C82
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9AC9E 7_2_00C9AC9E
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A96CC5 7_2_00A96CC5
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9FC4E 7_2_00C9FC4E
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9AD20 7_2_00C9AD20
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C97EFF 7_2_00C97EFF
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A23EF0 7_2_00A23EF0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B8EE0 7_2_009B8EE0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA0E1A 7_2_00CA0E1A
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A3EE70 7_2_00A3EE70
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A30E40 7_2_00A30E40
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A22FE0 7_2_00A22FE0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A33FF0 7_2_00A33FF0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C96F26 7_2_00C96F26
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69ADB6B0 10_2_69ADB6B0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF4970 10_2_69AF4970
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B20B89 10_2_69B20B89
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AB8B30 10_2_69AB8B30
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF4AC0 10_2_69AF4AC0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AD2D70 10_2_69AD2D70
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B2AC29 10_2_69B2AC29
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B04EE0 10_2_69B04EE0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69ACA0C0 10_2_69ACA0C0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B063B0 10_2_69B063B0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B12310 10_2_69B12310
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B2A54D 10_2_69B2A54D
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF4550 10_2_69AF4550
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69ABC7B0 10_2_69ABC7B0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69ABA7E0 10_2_69ABA7E0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AB6650 10_2_69AB6650
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B2B964 10_2_69B2B964
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B058D5 10_2_69B058D5
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B058D7 10_2_69B058D7
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B05830 10_2_69B05830
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B29AAB 10_2_69B29AAB
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B25DD2 10_2_69B25DD2
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B05DD0 10_2_69B05DD0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B11CA0 10_2_69B11CA0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF3C90 10_2_69AF3C90
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B2BFF1 10_2_69B2BFF1
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B29FFC 10_2_69B29FFC
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B05EB9 10_2_69B05EB9
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF3E50 10_2_69AF3E50
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B05050 10_2_69B05050
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B05274 10_2_69B05274
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF3260 10_2_69AF3260
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69AF3460 10_2_69AF3460
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032CCA28 10_2_032CCA28
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032CA9B8 10_2_032CA9B8
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C9890 10_2_032C9890
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C8368 10_2_032C8368
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C1120 10_2_032C1120
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C6F59 10_2_032C6F59
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C0D60 10_2_032C0D60
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_032C0D70 10_2_032C0D70
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CD0040 10_2_05CD0040
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CD31C0 10_2_05CD31C0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CD31B0 10_2_05CD31B0
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_05CD2E58 10_2_05CD2E58
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_066D26F8 10_2_066D26F8
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_066D0EB3 10_2_066D0EB3
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_066D26DD 10_2_066D26DD
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_066D0930 10_2_066D0930
Source: Joe Sandbox View Dropped File: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe F5913E753281DBDF88F36C73D13AFBF4AF62046E25F8E148E87A80E88818C4D7
Source: Joe Sandbox View Dropped File: C:\ProgramData\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
Source: Joe Sandbox View Dropped File: C:\ProgramData\mozglue.dll BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: String function: 00A09F00 appears 32 times
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: String function: 00A0A190 appears 47 times
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: String function: 69B19B35 appears 141 times
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: String function: 69B1D520 appears 31 times
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: String function: 69B190D8 appears 51 times
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3108 -ip 3108
Source: qk9TaBBxh8.exe Static PE information: invalid certificate
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Resource name: AUUPG type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: Number of sections : 16 > 10
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: Number of sections : 14 > 10
Source: qk9TaBBxh8.exe Static PE information: Number of sections : 15 > 10
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: Number of sections : 16 > 10
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe.0.dr Static PE information: Number of sections : 12 > 10
Source: Default16_team[1].exe.0.dr Static PE information: Number of sections : 14 > 10
Source: Space_bake[1].exe.0.dr Static PE information: Number of sections : 16 > 10
Source: Retailer_prog[1].exe.0.dr Static PE information: Number of sections : 16 > 10
Source: qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D7023A2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameFires0 vs qk9TaBBxh8.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2167052907.000001D7021D5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename7zS.sfx.exe, vs qk9TaBBxh8.exe
Source: qk9TaBBxh8.exe, 00000000.00000000.2050186808.00007FF6543E0000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameCookComputing.XmlRpcV2.dll8 vs qk9TaBBxh8.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2142101955.000001D702828000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameFires0 vs qk9TaBBxh8.exe
Source: qk9TaBBxh8.exe, 00000000.00000003.2167052907.000001D702214000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename7zS.sfx.exe, vs qk9TaBBxh8.exe
Source: 28.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: HiddenCobra_BANKSHOT_Gen date = 2017-12-26, hash5 = ef6f8b43caa25c5f9c7749e52c8ab61e8aec8053b9f073edeca4b35312a0a699, hash4 = daf5facbd67f949981f8388a6ca38828de2300cb702ad530e005430782802b75, hash3 = b766ee0f46c92a746f6db3773735ee245f36c1849de985bbc3a37b15f7187f24, hash2 = 8b2d084a8bb165b236d3e5436d6cb6fa1fda6431f99c4f34973dc735b4f2d247, hash1 = 89775a2fbb361d6507de6810d2ca71711d5103b113179f1e1411ccf75e6fc486, author = Florian Roth, description = Detects Hidden Cobra BANKSHOT trojan, hash9 = 6db37a52517653afe608fd84cc57a2d12c4598c36f521f503fd8413cbef9adca, hash8 = 3e6d575b327a1474f4767803f94799140e16a729e7d00f1bea40cd6174d8a8a6, hash7 = ec44ecd57401b3c78d849115f08ff046011b6eb933898203b7641942d4ee3af9, hash6 = d900ee8a499e288a11f1c75e151569b518864e14c58cc72c47f95309956b3eff, reference = https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 00000017.00000002.2716540059.0000000001AFF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000017.00000002.2719169995.0000000003650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 0000000F.00000002.3022350261.0000000001CBF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000017.00000002.2724393718.0000000003961000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 0000001C.00000002.2938091738.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: HiddenCobra_BANKSHOT_Gen date = 2017-12-26, hash5 = ef6f8b43caa25c5f9c7749e52c8ab61e8aec8053b9f073edeca4b35312a0a699, hash4 = daf5facbd67f949981f8388a6ca38828de2300cb702ad530e005430782802b75, hash3 = b766ee0f46c92a746f6db3773735ee245f36c1849de985bbc3a37b15f7187f24, hash2 = 8b2d084a8bb165b236d3e5436d6cb6fa1fda6431f99c4f34973dc735b4f2d247, hash1 = 89775a2fbb361d6507de6810d2ca71711d5103b113179f1e1411ccf75e6fc486, author = Florian Roth, description = Detects Hidden Cobra BANKSHOT trojan, hash9 = 6db37a52517653afe608fd84cc57a2d12c4598c36f521f503fd8413cbef9adca, hash8 = 3e6d575b327a1474f4767803f94799140e16a729e7d00f1bea40cd6174d8a8a6, hash7 = ec44ecd57401b3c78d849115f08ff046011b6eb933898203b7641942d4ee3af9, hash6 = d900ee8a499e288a11f1c75e151569b518864e14c58cc72c47f95309956b3eff, reference = https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Key value queried: HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon version
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Key value queried: HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon version
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Key value queried: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon version
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Key value queried: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon version
Source: lumma1504[1].exe.7.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: JpL3YVeZ0uQ2FWGpg5WG.exe.7.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Section: ZLIB complexity 0.9997554064239332
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Section: ZLIB complexity 1.000469355620155
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Section: ZLIB complexity 0.9892578125
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Section: ZLIB complexity 0.9994283536585366
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: Section: .reloc ZLIB complexity 1.5
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@286/417@0/31
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6656:120:WilError_03
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Mutant created: \Sessions\1\BaseNamedObjects\JarakHalgWW_11
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5088:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3568:120:WilError_03
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\Protect544cd51a.dll
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Mutant created: \Sessions\1\BaseNamedObjects\JarakHalgWW_16
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\CLR_PerfMon_WrapMutex
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\Users\user\AppData\Local\Temp\adobeIT8d9rZTEaOT Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe File opened: C:\Windows\system32\eecb8e3d148e90cd8ce98b246c214dcb08cf518c0aae8ec46d78507853acaa3fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File read: C:\Windows\System32\GroupPolicy\gpt.ini Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928161171.0000000000AB6000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2816985403.0000000000255000.00000002.00000001.01000000.0000000C.sdmp Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928161171.0000000000AB6000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2816985403.0000000000255000.00000002.00000001.01000000.0000000C.sdmp Binary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2802010279.0000000006694000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2825178536.00000000019EB000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2802147748.0000000006698000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2803504037.0000000006694000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2802782433.0000000006686000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2803689741.0000000006698000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2800207275.00000000013D8000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2801712120.00000000013D8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: qk9TaBBxh8.exe ReversingLabs: Detection: 36%
Source: qk9TaBBxh8.exe Virustotal: Detection: 25%
Source: zFe0EAtgy56yDxXht4nmozfb.exe String found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
Source: unknown Process created: C:\Users\user\Desktop\qk9TaBBxh8.exe "C:\Users\user\Desktop\qk9TaBBxh8.exe"
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetSvcs -p -s NcaSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" -s .\SZM3Yb.I -u
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process created: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp "C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp" /SL4 $20402 "C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe" 3022131 52224
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3108 -ip 3108
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process created: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" -s .\SZM3Yb.I -u
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process created: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp "C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp" /SL4 $20402 "C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe" 3022131 52224
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3108 -ip 3108
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process created: unknown unknown
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process created: unknown unknown
Source: C:\Windows\SysWOW64\WerFault.exe Process created: unknown unknown
Source: C:\Windows\explorer.exe Process created: unknown unknown
Source: C:\Windows\explorer.exe Process created: unknown unknown
Source: C:\Windows\explorer.exe Process created: unknown unknown
Source: C:\Windows\explorer.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: gpedit.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: activeds.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: dssec.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: dsuiext.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: dsrole.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: activeds.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ntdsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: authz.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: activeds.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: adsldpc.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: adsldpc.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fhsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msidle.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fhcfg.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wevtapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: efsutil.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dsrole.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncasvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: httpprxp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: firewallapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wpdbusenum.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: portabledeviceapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: portabledeviceconnectapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: d3d11.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: d3d10warp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: dxcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: d3d11.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: d3d10warp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: dxcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: ncrypt.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: ntasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: d3d11.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: dxgi.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: resourcepolicyclient.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: d3d10warp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: dxcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: wininet.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: mswsock.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: devobj.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: webio.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: winnsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: dnsapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: schannel.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: msasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: cryptsp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: rsaenh.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: gpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: vaultcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: wldp.dll
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Section loaded: ntmarta.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: <pi-ms-win-core-synch-l1-2-0.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: <pi-ms-win-core-fibers-l1-1-1.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: <pi-ms-win-core-synch-l1-2-0.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: <pi-ms-win-core-fibers-l1-1-1.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: <pi-ms-win-core-localization-l1-2-1.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: version.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: dxgidebug.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: sfc_os.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: rsaenh.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: dwmapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: riched20.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: usp10.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: msls31.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: windowscodecs.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: textshaping.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: textinputframework.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: coreuicomponents.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: coremessaging.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: ntmarta.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: coremessaging.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: wldp.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: propsys.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: profapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: edputil.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: urlmon.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: iertutil.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: srvcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: appresolver.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: bcp47langs.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: slc.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: userenv.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: sppc.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: pcacli.dll
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Section loaded: mpr.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: msimg32.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: msvcr100.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: wininet.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: ncrypt.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: ntasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: iertutil.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: wldp.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: profapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: mswsock.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: winnsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: urlmon.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: srvcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: dpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: ntmarta.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: mozglue.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: wsock32.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: vcruntime140.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: msvcp140.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: vcruntime140.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: propsys.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: linkinfo.dll
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Section loaded: windowscodecs.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: acgenral.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: winmm.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: samcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: msacm32.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: version.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: userenv.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: dwmapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: urlmon.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: mpr.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: winmmbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: winmmbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: iertutil.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: srvcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: aclayers.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: sfc.dll
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Section loaded: sfc_os.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: msimg32.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: msvcr100.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: winmm.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: powrprof.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: umpdc.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wtsapi32.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: winsta.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: sxs.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: amsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: userenv.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: profapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: version.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: netapi32.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: samcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: samlib.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: acgenral.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: winmm.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: samcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: msacm32.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: version.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: userenv.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: dwmapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: urlmon.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: mpr.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: winmmbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: winmmbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: iertutil.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: srvcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: aclayers.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: sfc.dll
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Section loaded: sfc_os.dll
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: msimg32.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: ncrypt.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: ntasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: msvcr100.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: d3d11.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: dxgi.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: resourcepolicyclient.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: d3d10warp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: dxcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: ntmarta.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: wininet.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: mswsock.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: devobj.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: webio.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: winnsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: dnsapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: schannel.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: msasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: cryptsp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: rsaenh.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: gpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: vaultcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: wldp.dll
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Section loaded: dpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: wininet.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: gpedit.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: gpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: activeds.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: dssec.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: dsuiext.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: framedynos.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: adsldpc.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: authz.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: dsrole.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: logoncli.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: mpr.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ntdsapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: webio.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: mswsock.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: winnsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: sspicli.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: dnsapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: schannel.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ntasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ncrypt.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: msasn1.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: cryptsp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: rsaenh.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: cryptbase.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: gpapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: wldp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: amsi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: userenv.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: profapi.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: version.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: iertutil.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: urlmon.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: srvcli.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: netutils.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: propsys.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: edputil.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: wintypes.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: appresolver.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: bcp47langs.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: slc.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: sppc.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: apphelp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: winhttp.dll
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: msimg32.dll
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: msvcr100.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wininet.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dbghelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.storage.dll
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EA502722-A23D-11D1-A7D3-0000F87571E3}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File written: C:\Windows\System32\GroupPolicy\gpt.ini Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Window found: window name: TMainForm
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: qk9TaBBxh8.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: qk9TaBBxh8.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: qk9TaBBxh8.exe Static file information: File size 4334016 > 1048576
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Windows\SysWOW64\msvcr100.dll
Source: qk9TaBBxh8.exe Static PE information: Raw size of .vmp(R is bigger than: 0x100000 < 0x3cda00
Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbW source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdbP@n@ `@_CorExeMainmscoree.dll source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DCD000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2718547054.0000000069B34000.00000002.00000001.01000000.00000021.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2693560746.0000000005EF0000.00000004.08000000.00040000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004AC8000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: E:\HD_Audio\VS2005\Resetup\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DCD000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\laracu valo35\tag\ped\kixe\vevuyohiyiva_yicofok.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D70232C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128070226.000001D702377000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D702356000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127511693.000001D702218000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126674447.000001D7021F6000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D702377000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdb source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000003.2613298063.000001DB77B90000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2622806676.000000C0000AC000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000266000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D7023E9000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127896153.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126643406.000001D70224D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128179905.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, T9n2wvLQ1PO2GfTxLTyp21hE.exe, 0000000E.00000002.2520477544.00000000002F9000.00000002.00000001.01000000.0000000D.sdmp, T9n2wvLQ1PO2GfTxLTyp21hE.exe, 0000000E.00000000.2397254577.00000000002F9000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbEMP source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: zFe0EAtgy56yDxXht4nmozfb.exe, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2928592869.0000000000B39000.00000040.00000001.01000000.00000006.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000001.2521718747.00000000002F0000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\vuhuyiwulumopo62_soba.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2132642581.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127967224.000001D7021F5000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2134526384.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128255759.000001D702217000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2138129759.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2136306601.000001D70245C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2130037595.000001D702217000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2129915477.000001D7021B0000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142101955.000001D7027FE000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2132761360.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Moq.pdbSHA256@ source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\sehuxi\gukulow\tulatesati\wudapul-rarupi.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2142363047.000001D702353000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2145509043.000001D703B50000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141999180.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2149442634.000001D704113000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142230053.000001D7023EB000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2143104056.000001D702988000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142675803.000001D702495000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2145072174.000001D703403000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2141838147.000001D70224D000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2146166478.000001D703DAA000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2142453918.000001D7022E1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\sc-client\Jenkins\workspace\WindowsBuild\SecureConnectClient\ACVC.Core\obj\WinRelease\netstandard2.0\AWSVPNClient.Core.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000003.2613298063.000001DB77B90000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2622806676.000000C0000AC000.00000004.00001000.00020000.00000000.sdmp, EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000266000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: Moq.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\projects\polly\src\Polly.Net45\obj\Release\net45\Polly.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2471533821.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbV source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Temp\Json\Working\Newtonsoft.Json\Src\Newtonsoft.Json\obj\Release\Newtonsoft.Json.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: uic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583230702.0000000001538000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2472974179.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: inaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DD8000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\projects\polly\src\Polly.Net45\obj\Release\net45\Polly.pdbjz source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2448673035.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdboF source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\TestProject\SetupAfterRebootService\SetupAfterRebootService\obj\Release\SetupAfterRebootService.pdb,ANA @A_CorExeMainmscoree.dll source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2818869445.0000000000DD8000.00000002.00000001.01000000.0000000C.sdmp
Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2472336262.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2469992759.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbh source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.000000000165A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\sc-client\Jenkins\workspace\WindowsBuild\SecureConnectClient\ACVC.Core\obj\WinRelease\netstandard2.0\AWSVPNClient.Core.pdbSHA256 source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbeIn source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2705372697.00000000064C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.PDB source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583230702.0000000001538000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.PDB source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2583454236.00000000015D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2693560746.0000000005FAA000.00000004.08000000.00040000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.0000000004B84000.00000004.00000800.00020000.00000000.sdmp, nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.00000000049F9000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: 453C:\laracu valo35\tag\ped\kixe\vevuyohiyiva_yicofok.pdb source: qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D70232C000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2128070226.000001D702377000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127430688.000001D702356000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127511693.000001D702218000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2126674447.000001D7021F6000.00000004.00000020.00020000.00000000.sdmp, qk9TaBBxh8.exe, 00000000.00000003.2127725914.000001D702377000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: Jsakr_KmqehdR6ptAH1OzwuM.exe, 0000000C.00000003.2448940390.0000022634F1C000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Unpacked PE file: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Unpacked PE file: 23.2.ocI8OvNXSYwHw7Rg5l6_f8IK.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Unpacked PE file: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe.0.dr Static PE information: 0x81E836EB [Mon Jan 24 10:54:35 2039 UTC]
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B8BB0 LoadLibraryA,GetProcAddress, 7_2_009B8BB0
Source: initial sample Static PE information: section where entry point is pointing to: .vmp(R
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe File created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_6283546
Source: 45NBK9axc23mjqmbKvmG0NYP.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x6b986a
Source: T9n2wvLQ1PO2GfTxLTyp21hE.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x2e406a
Source: setup294[1].exe.0.dr Static PE information: real checksum: 0x0 should be: 0x2e406a
Source: TUBbflj40zqtNIEKWH_MWjeG.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x3428c5
Source: JpL3YVeZ0uQ2FWGpg5WG.exe.7.dr Static PE information: real checksum: 0x0 should be: 0x51fa4
Source: setup[1].exe.0.dr Static PE information: real checksum: 0x0 should be: 0x6b986a
Source: tXlQ3NLbQqxBkFS_TfaDHWX4.exe.0.dr Static PE information: real checksum: 0x443bbc should be: 0x4411b9
Source: lumma1504[1].exe.7.dr Static PE information: real checksum: 0x0 should be: 0x51fa4
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x4a74cf
Source: FSYOvyvMMT80PCsMousFK1Xa.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x6e75f
Source: 060[1].exe.0.dr Static PE information: real checksum: 0x0 should be: 0x3428c5
Source: cad54ba5b01423b1af8ec10ab5719d97[1].exe.0.dr Static PE information: real checksum: 0x443bbc should be: 0x4411b9
Source: cjlnYlPYSIAljKunxGKtil91.exe.0.dr Static PE information: real checksum: 0x0 should be: 0x7fbb4
Source: qk9TaBBxh8.exe Static PE information: section name: _RDATA
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .themida
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: qk9TaBBxh8.exe Static PE information: section name: .vmp(R
Source: setup294[1].exe.0.dr Static PE information: section name: .didat
Source: T9n2wvLQ1PO2GfTxLTyp21hE.exe.0.dr Static PE information: section name: .didat
Source: grabber[1].exe.0.dr Static PE information: section name: _RDATA
Source: Jsakr_KmqehdR6ptAH1OzwuM.exe.0.dr Static PE information: section name: _RDATA
Source: setup[1].exe.0.dr Static PE information: section name: .sxdata
Source: 45NBK9axc23mjqmbKvmG0NYP.exe.0.dr Static PE information: section name: .sxdata
Source: Space_bake[1].exe.0.dr Static PE information: section name: 8<&>8<&>
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vm_sec
Source: Space_bake[1].exe.0.dr Static PE information: section name: .themida
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Space_bake[1].exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: 8<&>8<&>
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vm_sec
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .themida
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe.0.dr Static PE information: section name: .vmp$~
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe.0.dr Static PE information: section name: .xdata
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name:
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name: .themida
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: 8<&>8<&>
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vm_sec
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .themida
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: Retailer_prog[1].exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: 8<&>8<&>
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vm_sec
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .themida
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 70Leo0eE867BJ4vm1aky3Uk3.exe.0.dr Static PE information: section name: .vmp$~
Source: 123p[1].exe.0.dr Static PE information: section name: .00cfg
Source: 123p[1].exe.0.dr Static PE information: section name: .text0
Source: 123p[1].exe.0.dr Static PE information: section name: .text1
Source: 123p[1].exe.0.dr Static PE information: section name: .text2
Source: bKj5ORDxbqgwdZav4hyONQmM.exe.0.dr Static PE information: section name: .00cfg
Source: bKj5ORDxbqgwdZav4hyONQmM.exe.0.dr Static PE information: section name: .text0
Source: bKj5ORDxbqgwdZav4hyONQmM.exe.0.dr Static PE information: section name: .text1
Source: bKj5ORDxbqgwdZav4hyONQmM.exe.0.dr Static PE information: section name: .text2
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .themida
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: Default16_team[1].exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .themida
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: zFe0EAtgy56yDxXht4nmozfb.exe.0.dr Static PE information: section name: .vmp(R
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push esi; mov dword ptr [esp], ebp 7_2_00E80367
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push 4F06C92Dh; mov dword ptr [esp], eax 7_2_00E803EE
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push 7636159Eh; mov dword ptr [esp], ebp 7_2_00E8040E
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push ebp; mov dword ptr [esp], ebx 7_2_00E80437
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push eax; mov dword ptr [esp], 091E1DA7h 7_2_00E8043B
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA00C2 push 0812876Eh; mov dword ptr [esp], edx 7_2_00E80453
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push 61DAC6FAh; mov dword ptr [esp], ebx 7_2_00E8D06B
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push 0D85E02Fh; mov dword ptr [esp], ebx 7_2_00E8D07E
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push edi; mov dword ptr [esp], edx 7_2_00E8D106
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push 2D7165BDh; mov dword ptr [esp], eax 7_2_00E8D136
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push 113FA432h; mov dword ptr [esp], edx 7_2_00E8D185
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push esi; mov dword ptr [esp], edi 7_2_00E8D1B4
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00CA10DF push 16F8509Dh; mov dword ptr [esp], ebp 7_2_00E8D1F2
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push edi; mov dword ptr [esp], 74987DF3h 7_2_00E8B466
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push 0A356C75h; mov dword ptr [esp], edx 7_2_00E8B4A6
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push 2DB481B2h; mov dword ptr [esp], ebp 7_2_00E8B4BE
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push edi; mov dword ptr [esp], 000AAB40h 7_2_00E8B4F4
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push ecx; mov dword ptr [esp], edi 7_2_00E8B544
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push 67A52874h; mov dword ptr [esp], esi 7_2_00E8B55D
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push 4DB8E5FAh; mov dword ptr [esp], esi 7_2_00E8B56B
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push ebp; mov dword ptr [esp], esi 7_2_00E8B5C7
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9C0DE push ecx; mov dword ptr [esp], 689A5673h 7_2_00E8B5DE
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A085 push esi; mov dword ptr [esp], ecx 7_2_00E83CF7
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A085 push ecx; mov dword ptr [esp], edi 7_2_00E83D18
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A085 push edx; mov dword ptr [esp], 1C8962A3h 7_2_00E83D62
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9A085 push 27573FFCh; mov dword ptr [esp], eax 7_2_00E83DAF
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F059 push eax; mov dword ptr [esp], ecx 7_2_00E7F5E2
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F059 push 4E72897Dh; mov dword ptr [esp], ebp 7_2_00E7F5F3
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F059 push 390B7670h; mov dword ptr [esp], ebx 7_2_00E7F5FB
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F059 push edi; mov dword ptr [esp], 000AA9F8h 7_2_00E7F62C
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00C9F059 push ecx; mov dword ptr [esp], 0B2FAB06h 7_2_00E7F68F
Source: ooon0i8sg2EZy1pci_ppgkth.exe.0.dr Static PE information: section name: entropy: 7.999611881196484
Source: lumma1504[1].exe.7.dr Static PE information: section name: .text entropy: 7.996781792059311
Source: JpL3YVeZ0uQ2FWGpg5WG.exe.7.dr Static PE information: section name: .text entropy: 7.996781792059311

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Process created: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-synch-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\charset_normalizer\md.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-timezone-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\python3.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\d4814c7a[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l2-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-conio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\ucrtbase.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\charset_normalizer\md__mypyc.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-console-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File created: C:\ProgramData\MPGPH131\MPGPH131.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-filesystem-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\pyexpat.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe File created: C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\pywin32_system32\pywintypes38.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\ssleay32.dll (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-locale-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32api.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\setup294[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\python38.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\upx.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe File created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\registers.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\setup[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processthreads-l1-1-1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-sysinfo-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\Pythonwin\win32ui.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_iscrypt.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\libssl-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_ctypes.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\is-EGFT5.tmp Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\Users\user\AppData\Local\AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\AdobeUpdaterV202.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\rules[1].exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\grabber[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-debug-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-stdio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-math-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\pywin32_system32\pythoncom38.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-environment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-libraryloader-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\Retailer_prog[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\Users\user\AppData\Local\Temp\heidiIT8d9rZTEaOT\JpL3YVeZ0uQ2FWGpg5WG.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-datetime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-rtlsupport-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\twain_32.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32security.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\select.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\cacls.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\zstandard\backend_c.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\soulmediaplayer.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\atieclxx.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processenvironment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe File created: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32wnet.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\Space_bake[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\MSVCP140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\libeay32.dll (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-process-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\zstandard\_cffi.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\is-TIE2M.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\Pythonwin\mfc140u.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\btswgej Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-synch-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-runtime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-errorhandling-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\psutil\_psutil_windows.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\VCRUNTIME140_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\Default16_team[1].exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\060[1].exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\cad54ba5b01423b1af8ec10ab5719d97[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32net.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\BdeUISrv.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processthreads-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_elementtree.pyd Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\netconn_properties.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\libffi-7.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\123p[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe File created: C:\Users\user\AppData\Local\Temp\SZM3Yb.I Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-profile-l1-1-0.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\sqln[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\lumma1504[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\libcrypto-1_1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-convert-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_socket.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\VCRUNTIME140.dll Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\AggregatorHost.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-utility-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-memory-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-handle-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-localization-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-namedpipe-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\libssl-1_1.dll (copy) Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\_queue.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-interlocked-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-time-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\at.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\is-GP76V.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-multibyte-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe File created: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\Install.exe Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\timeSync[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Soul Media Player\is-3VR8O.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32trace.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\_win32sysloader.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File created: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp File created: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_RegDLL.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe File created: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-util-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\mozglue.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\msvcp140.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File created: C:\ProgramData\MPGPH131\MPGPH131.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File created: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe File created: C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File created: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe File created: C:\Users\user\AppData\Local\Temp\SZM3Yb.I Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\btswgej Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\128.png
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\manifest.json
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\performance.js
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\popup.css
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\popup.html
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\popup.js
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\worker.js
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\_metadata
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjnniijcjakoaghpedjpcfkoclplenf\3.0_0\_metadata\verified_contents.json
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry value created: HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\PreferenceMACs\Default\extensions.settings

Boot Survival

barindex
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Window searched: window name: FilemonClass
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Window searched: window name: RegmonClass
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Window searched: window name: RegmonClass
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Window searched: window name: FilemonClass
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\btswgej:Zone.Identifier read attributes | delete
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Memory written: PID: 3608 base: 7FFDB4590008 value: E9 EB D9 E9 FF
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Memory written: PID: 3608 base: 7FFDB442D9F0 value: E9 20 26 16 00
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A21A30 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 7_2_00A21A30
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\TUBbflj40zqtNIEKWH_MWjeG.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: nRGT2oA3F8V3EBSM6dmMTrGw.exe PID: 3108, type: MEMORYSTR
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Sandbox detection routine: GetCursorPos, DecisionNode, Sleep
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Evasive API call chain: GetPEB, DecisionNodes, Sleep
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Stalling execution: Execution stalls by calling Sleep
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe System information queried: FirmwareTableInformation
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: FSYOvyvMMT80PCsMousFK1Xa.exe, 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp Binary or memory string: AAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Special instruction interceptor: First address: 7FF653CAC146 instructions caused by: Self-modifying code
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Special instruction interceptor: First address: 613339 instructions caused by: Self-modifying code
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Special instruction interceptor: First address: C4B373 instructions caused by: Self-modifying code
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory allocated: 3280000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory allocated: 3330000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory allocated: 5330000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: FC0000 memory reserve | memory write watch
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 2C80000 memory reserve | memory write watch
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 2AB0000 memory reserve | memory write watch
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos, 7_2_009FD9F0
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Thread delayed: delay time: 300000 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Thread delayed: delay time: 300000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Window / User API: threadDelayed 1047 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Window / User API: threadDelayed 1613 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 1069
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 442
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-synch-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\charset_normalizer\md.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-timezone-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\python3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l2-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-conio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\charset_normalizer\md__mypyc.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-console-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\pyexpat.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-filesystem-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\ssleay32.dll (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\pywin32_system32\pywintypes38.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-locale-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\ProgramData\nss3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32api.pyd Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\python38.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\upx.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\registers.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processthreads-l1-1-1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-sysinfo-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\Pythonwin\win32ui.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_iscrypt.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\libssl-1_1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_ctypes.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\is-EGFT5.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\AdobeUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\AdobeUpdaterV202.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-debug-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-stdio-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-math-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\pywin32_system32\pythoncom38.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\unins000.exe (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-environment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-libraryloader-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\heidiIT8d9rZTEaOT\JpL3YVeZ0uQ2FWGpg5WG.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-datetime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-rtlsupport-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\twain_32.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32security.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\select.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\cacls.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\zstandard\backend_c.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\soulmediaplayer.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\atieclxx.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processenvironment-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32wnet.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\libeay32.dll (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\zstandard\_cffi.cp38-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Dropped PE file which has not been started: C:\ProgramData\MSIUpdaterV202_3e3a2bee5ace9e061f31a101c1269b0c\MSIUpdaterV202.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-process-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\is-TIE2M.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\ProgramData\softokn3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\Pythonwin\mfc140u.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-synch-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-runtime-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-errorhandling-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\psutil\_psutil_windows.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-string-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\VCRUNTIME140_1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32net.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\BdeUISrv.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-processthreads-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_elementtree.pyd Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\ProgramData\freebl3.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-file-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\exe\netconn_properties.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_shfoldr.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-heap-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\libffi-7.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\SZM3Yb.I Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-profile-l1-1-0.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\sqln[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\lumma1504[1].exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\libcrypto-1_1.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-convert-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_socket.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\AggregatorHost.exe Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-memory-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-utility-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-localization-l1-2-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-handle-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-namedpipe-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\libssl-1_1.dll (copy) Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\_queue.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-interlocked-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-time-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\at.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\is-GP76V.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-crt-multibyte-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\45NBK9axc23mjqmbKvmG0NYP.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7zSDDAF.tmp\Install.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Soul Media Player\is-3VR8O.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\win32trace.pyd Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\win32\_win32sysloader.pyd Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7JMLT.tmp\is-P287H.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BMP08.tmp\_isetup\_RegDLL.tmp Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\api-ms-win-core-util-l1-1-0.dll Jump to dropped file
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40602\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe TID: 6536 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe TID: 3892 Thread sleep count: 1047 > 30 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe TID: 3892 Thread sleep time: -209400s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe TID: 5168 Thread sleep time: -300000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe TID: 3852 Thread sleep time: -600000s >= -30000s Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe TID: 6724 Thread sleep count: 1613 > 30 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe TID: 6724 Thread sleep time: -162913s >= -30000s Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe TID: 5828 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe TID: 4156 Thread sleep count: 156 > 30
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe TID: 5320 Thread sleep count: 85 > 30
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe TID: 5320 Thread sleep count: 155 > 30
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe TID: 6936 Thread sleep count: 60 > 30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6104 Thread sleep time: -11990383647911201s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1464 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\explorer.exe TID: 3556 Thread sleep time: -31500s >= -30000s
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Last function: Thread delayed
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A7B1CB FindFirstFileExW,GetLastError, 7_2_00A7B1CB
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009AB300 FindFirstFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error, 7_2_009AB300
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Thread delayed: delay time: 300000 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Thread delayed: delay time: 300000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696487552f
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2559070588.0000000001961000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}6`
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696487552}
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000194B000.00000004.00000020.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000198D000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp, eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.000000000133A000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001D22000.00000004.00000020.00020000.00000000.sdmp, NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696487552
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.0000000001366000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWen-GBn
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935186807.0000000006678000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}rogramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696487552o
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2558145071.0000000001350000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696487552j
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000002.2819469412.000000000133A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2831094134.0000000006694000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: H4sIAAAAAAAAAN1ca2/juJL9K4t8HTmj9yMX+8Fxko5n8vDETvruvX0RyBJtK5EljSQn7R3Mf99TpJ62JbtngcXFAoOeSKwqFovFqlMk5T/ORnG0CJbjq+zs4uyPb2fXo+m3s4tvZ5PB00CRbdWw5IEyUBRpMrga6Kpm2wN1YH47k0DqL1lB+3dQqLKsaGhUZKl4YRi2BmateFY02zHxbIhn2dY1E60Ds3h2FFs3IcAoGGTLcNAdRBQUIJEVg/ovCXRTUepndOmYat2jrNqqBuWNgaGWfVqqYuH/A7XSSjYMFTLKZ4wZnSoDq3yWLctBu1VqqSoq0Tvls2kackMH2VC0hk6yY6kauAdK1YEOJdCBUz5rjqnXCsiOI9ty3S7bjmWQ0fkccAYVJE2NYXm7oaGpGZZBZqsZFINmRi/NhkE1JoKGaDoNszmOabSeDdNsdoAhqa2JxMTaA32gVAQwqd4QAI0UvWkTXdZhkfoZE6U0TaBamt16Vgy7Kc+2bWdgVDaVbdMg11EGdjlGh/5rjBlWtPTGGGxHNbizVc+K4jRUVDSTT3vVbplmc1ptQzHMhkq26tgGqaRUL+CemIWyQ90yoB9UqAgwD2rDipajW1qjB902uTNXg7QsQ2sxWAq3YukomCXHGWjQSrFLQ1myYjesoGsa962KwFIMp+UakCJDy6odhtAaM2XJMqa+HpVhGlpTBxNKtWbKVFWnXk2yIcO0TXrFkVXy1YpAk83mIA1b0dWmADin2Ry0amE1qdpAr8eo0kxiMuSSRsf0NpQyVNXQyV9LAsQESKgDDWxvI+5plRl0mqyGVphMRWs8q6am0mSrpUR0YjkNNeEv5G7awCnfaJaJwFQPjJtiAJ5SpmbKttIMZpYu80BSdSqT7Rsuq+o8GtZ9WpgqUKjFMBRL1uXGutdkzajoHcuBUZyBXTwqKixgDQxyV54KHBvuiWWsly+og4Ep/POJh2vbgHq2cPEnsU5NpTT0E7eb7hgDW4yBv9DhxgOKJnbxBmnBgRS1lGtbWAgU/kzxaGoyOahRPGoy5RS4kFALDm+SUrolLecKY4quXOi6Zcu6pL3Jy6Vumhe6ptiWJaUsY/k8iJZEIJuy5CmBjUiiXuiqqUPlzySOMjdXXw0ZJOQE0tubykzHhgxVtWxFchxjpSH0oB0Ly5Qc/22OWXDQhwVrS/OFt7Rs1cIzQpwp5c7vqRsFazcP4oit3SB0N3m8CMIQFI7hKBIWmEYBmHo0TEVic19bKhaNwjAR3fJkEMaks+aAVJrLylug2cYF9Y8OAmWpLk1ZJwU0w5GcxYItHRoTsgYWBNMsF2tKJXrbBj/G763c/PcNSwOWvRqvwTqBZTLo9/oZ5KvXlPlByrz8dZOGGcQgucCWvqvNNT5O3VEcyTdt31cd6tZQHZiOzQcZC8E22ETZKkgudAP+oUn2G+KcQQbBErMtKVCZBX1tsjmSu2SuFLZCAqXhI9FKzFE906Z2Be2GpMiub+uyTB2beHZ83XMdHeNHIAN/4LMoDxZbf05vsAqlTzcMWZ5kn2EQvW8S382ZMJYjBW++Y1oatCZgYUqKp9u6TaNSIF2TEDvtQNfQGaUsS7L0JVKfbZGyWA+S5rE3OIx9oWGlORaMqS90h6xgIArp0pvuywtTd7hyCA1zsj5AzYXmAOlYkuN5JpKphnYFwV7y48/ITdP4M/PSOAzJ/HkaLJcsjdjnhQbDyaoUAa+FMRwoWhJBvMnzeLkMaVCYG1NaWHN/aSrkxVjgiuRb9tsS8Q4WhQcbkim7iMoyOZgJl5OYrQOnOTSVgGNwOB/E3uIC6RH4THKNpfamWGBHPLBt6Lhm3xM34g7ygXlCorNUKYPh8ZZ5braau967FwbeO5o1pHIsdubrKoaNNYEeMvcDymdblm2CC0Q5VXMkOQgYohlMadka/PhNe/MD3YKpEXhNQ4LhdYiADEA6OJjsMUXFJKIDUh4dyJpiEbehY8xIhAvThNKKRcv0Q3mFBaMYnhF4fO1h6ZMFsw1XStckRVu+LYDkoBAWriOp3mrhmjo9a+gZHWRMVWxqhmGkwPDYyjKMCw0Og3WVeEka+xsvn29TtmTfWbTJ0IYJkyXVZTogEvk0Ug/cTvdVBjxCPm0bNBY/sA3VxFhkhdzQsFcLBz6uGXB1DV0nbobJw9jhNYa0gG/En+48ZFhmCFIXmuZoqiopbM5c3YRODtzXlizVX/mAitADqNeW5oaJtWpjpinGWLCK8urG3jKNN0mmupGvcU5HlXybvdFUXWgqEhdpkMfvjkkaEbCSfMYSxkL4HWyoXAB1G5hDlqeMuUnwoUAFmVChtHrzZUujZ1qMtmQuVsgyJgRjoLosLTOWYnCQQNUD+mHRChOMZhQemhTYAQZgYPXrgAlY7arGVNjsQrU1hANJXXgrvFAvKP9iwWKe4wjrnFHs+Z6nrkdzDfsQ7pfwBivJDdeBjyC8ZBrYMHeatMrX4SJ1l2vEDg/GZZwN3qvaQEOk1nsYI0nQhADMY/hZsIxYmq3ilFF3yHgGzY6tEzFmBea/UBzFhAmYb1oqHrA2HYnHoIDc0qDg5jN/iSm+UGwHYbQqqkRJVpdhCsWfEsDQs2YatlmgMvGsygRH9PIZM241n1Wg2QJriGdD15v8AEBGUz5wmlUAhSdeuRka5XGneIZTmGpDHsAMQJpeyqP8xYFGCRUAjTnqs8pnAw7ZfJaRM+v+EFLwrtaPnqkMBbgxavDBYWANPixOUg4B+VzjJUjJYCBsUJclzNAchyM4pexDM02OhsoxyzrVD0C6Arsg91oEjxRVPKLcNQkNKVbxTCUW6soC2egIZoCPA7t4NFXTGOgK4Ztqmq9iAIBoyJ0taxTdWMw6zUbRFVnX0UrMS8+qbjpa49lGwqehC3MjgPLqrkBUFpyDPwpFUfupRlk6QW9NIcWAwPgjCgxdK6okaC1DF0K1ohFZDl5jASmKR3itQzUXpUraHaACX6vQ/9XAsTV4DSBo7dk3
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2534399884.00000000017B0000.00000004.00001000.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2534914256.00000000017B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: \SystemRoot\system32\ntkrnlmp.exeSDT\VBOX__=l{TW
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696487552t
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832513735.0000000006771000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: urG3jKNN0mmupGvcU5HlXybvdFUXWgqEhdpkMfvjkkaEbCSfMYSxkL4HWyoXAB1G5hDlqeMuUnwoUAFmVChtHrzZUujZ1qMtmQuV`yw
Source: svchost.exe, 00000004.00000003.2064877424.000001B660644000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000194B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696487552u
Source: svchost.exe, 00000004.00000003.2064714090.000001B660644000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: eQEIduvtZVhzsp4oDFOuc1gy.exe, 0000000D.00000003.2558145071.0000000001350000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696487552x
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696487552d
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2723423186.000001DB32588000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696487552]
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2530760258.00000000017B0000.00000004.00001000.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2532049009.00000000017B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: \SystemRoot\system32\ntkrnlp.exeSDT\VBOX__=l{TW
Source: svchost.exe, 00000002.00000002.2365281795.000001721B402000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696487552s
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696487552t
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552x
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2533712340.00000000017B0000.00000004.00001000.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2535385556.00000000017B0000.00000004.00001000.00020000.00000000.sdmp, zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2532394450.00000000017B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: \SystemRoot\system32\ntkrnlm.exeSDT\VBOX__=l{TW
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552}
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000003.2832757833.000000000678C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2932153038.000000000198D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWen-GBn&pd
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe System information queried: CodeIntegrityInformation
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Thread information set: HideFromDebugger
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Thread information set: HideFromDebugger
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: regmonclass
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: gbdyllo
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: ollydbg
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: filemonclass
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Process queried: DebugObjectHandle
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process queried: DebugObjectHandle
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Process queried: DebugPort
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B2496E UnDecorator::getDataIndirectType,LdrInitializeThunk,DName::operator+=,DName::operator+,UnDecorator::getScope,DName::DName,DName::operator+,DName::operator+=,DName::operator+=,DName::operator+=,DName::operator+=,DName::operator+=,DName::DName,DName::operator+, 10_2_69B2496E
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B1B144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 10_2_69B1B144
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B8BB0 LoadLibraryA,GetProcAddress, 7_2_009B8BB0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B60B0 mov ecx, dword ptr fs:[00000030h] 7_2_009B60B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009FD9F0 mov eax, dword ptr fs:[00000030h] 7_2_009FD9F0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009FD9F0 mov eax, dword ptr fs:[00000030h] 7_2_009FD9F0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009BAB90 mov eax, dword ptr fs:[00000030h] 7_2_009BAB90
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009B46B0 mov eax, dword ptr fs:[00000030h] 7_2_009B46B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_009A94C0 OutputDebugStringA,GetModuleHandleA,GetProcAddress,GetProcessHeap,HeapAlloc,HeapFree,HeapAlloc,HeapFree, 7_2_009A94C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process token adjusted: Debug
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B1B144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 10_2_69B1B144
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B1948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 10_2_69B1948B
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exe File created: btswgej.37.dr Jump to dropped file
Source: C:\Windows\explorer.exe Network Connect: 102.53.9.151 80
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Memory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2C00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Thread created: C:\Windows\explorer.exe EIP: 87E19D0
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpyware Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpyware
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654269878 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x140FC862F
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF65424AA01 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654306125 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtOpenFile: Direct from: 0x140FBCAB9
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654099F90 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x1416B420B
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654268F99 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654259802 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Indirect: 0x140F595B5
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtQueryInformationProcess: Indirect: 0x7FF653EDEC0A Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654099B9D Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x1416AD85D
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF65425115C Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654271721 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF65426DF36 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtQuerySystemInformation: Indirect: 0x7FF653E74BC9 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x140FBCAC6
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF65426ADC1 Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF6542317FC Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtSetInformationThread: Indirect: 0x7FF653EDC44F Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtMapViewOfSection: Direct from: 0x14102BFF1
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x141037F5D
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x141699636
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe NtProtectVirtualMemory: Direct from: 0x141019C6D
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtQueryInformationProcess: Indirect: 0x7FF653EDED5F Jump to behavior
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe NtProtectVirtualMemory: Direct from: 0x7FF654219A33 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Memory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2C00000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: wifeplasterbakewis.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: mealplayerpreceodsju.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: bordersoarmanusjuw.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: suitcaseacanehalk.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: absentconvicsjawun.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: pushjellysingeywus.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: economicscreateojsu.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: entitlementappwo.shop
Source: EWdN3bvBjxAbF1GyzHE7_p73.exe, 00000008.00000002.2693327853.000000C000372000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: stripmarrystresew.shop
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: read write
Source: C:\Users\user\Documents\SimpleAdobe\ocI8OvNXSYwHw7Rg5l6_f8IK.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Section unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base address: 400000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Memory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2C00000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Memory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2BBB008 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 464000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 4C0000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42E000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 641000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9E3008 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: BE0008
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\FSYOvyvMMT80PCsMousFK1Xa.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\T9n2wvLQ1PO2GfTxLTyp21hE.exe Process created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" -s .\SZM3Yb.I -u
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\cjlnYlPYSIAljKunxGKtil91.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3108 -ip 3108
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Windows\System32\svchost.exe Process created: unknown unknown
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69B184B0 cpuid 10_2_69B184B0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\EWdN3bvBjxAbF1GyzHE7_p73.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\70Leo0eE867BJ4vm1aky3Uk3.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Queries volume information: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\Pythonwin VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\charset_normalizer VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\pywin32_system32 VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\win32 VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\win32 VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\win32 VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\zstandard VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\Jsakr_KmqehdR6ptAH1OzwuM.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI40602\certifi VolumeInformation Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Code function: 7_2_00A7C84D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime, 7_2_00A7C84D
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Registry value created: Exclusions_Extensions 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender Registry value created: DisableAntiSpyware 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender Registry value created: DisableRoutinelyTakingAction 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableBehaviorMonitoring 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableOnAccessProtection 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableScanOnRealtimeEnable 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRealtimeMonitoring 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableIOAVProtection 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{C3174531-87C3-4E8A-B459-F082A9BDC670}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRawWriteNotification 1 Jump to behavior
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender Registry value created: DisableAntiSpyware 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender Registry value created: DisableRoutinelyTakingAction 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Registry value created: Exclusions_Extensions 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableBehaviorMonitoring 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableOnAccessProtection 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableScanOnRealtimeEnable 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRealtimeMonitoring 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableIOAVProtection 1
Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{F7268D09-0253-482E-9684-37327F29D4B0}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Registry value created: DisableRawWriteNotification 1
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe Registry value created: Exclusions_Extensions 1 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe Registry value created: Exclusions_Extensions 1
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe File written: C:\Windows\System32\GroupPolicy\gpt.ini Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\Documents\SimpleAdobe\bKj5ORDxbqgwdZav4hyONQmM.exe Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\Desktop\qk9TaBBxh8.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select * From AntiVirusProduct
Source: C:\Users\user\Documents\SimpleAdobe\tXlQ3NLbQqxBkFS_TfaDHWX4.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select * From AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 17.1.tXlQ3NLbQqxBkFS_TfaDHWX4.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000011.00000001.2435771287.0000000000843000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000003.2405630696.0000000001C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3015167493.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.2626409081.00000000044AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
Source: Yara match File source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.aeac0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.80000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.aeac0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001D.00000002.2809504099.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.00000000044AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2439089037.00000000000AE000.00000004.00000001.01000000.00000013.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2970352519.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 7.2.zFe0EAtgy56yDxXht4nmozfb.exe.9a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.eQEIduvtZVhzsp4oDFOuc1gy.exe.140000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000003.2850327356.00000000066F2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2852539306.00000000066F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: eQEIduvtZVhzsp4oDFOuc1gy.exe PID: 4160, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\J4dorNOROd60TEXKOpUsDEA.zip, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\YrWSGTvMbD1qxqADGULdj7d.zip, type: DROPPED
Source: Yara match File source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.2724393718.0000000003961000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: NyiVs23yIO_0wMOj5TwwBpJ5.exe PID: 3704, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.25eac0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.25eac0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.230000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2938091738.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2976391613.0000000000EEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000003.2405630696.0000000001C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2938091738.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3015167493.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FSYOvyvMMT80PCsMousFK1Xa.exe PID: 3884, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: NyiVs23yIO_0wMOj5TwwBpJ5.exe PID: 3704, type: MEMORYSTR
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: qk9TaBBxh8.exe, 00000000.00000003.2133362351.000001D702131000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: TITLe=PqReuElOduOrgsLsxWdIfSpCkXIpJffDrFgNSfOTIoOvihLdLHCvwSQGslZygAOktHpJAxxfDTyUJaltQwGJzOIYYOTDxxHxVrWFYIwevrxmbIgrW
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935186807.0000000006692000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935186807.0000000006692000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: zFe0EAtgy56yDxXht4nmozfb.exe, 00000007.00000002.2935186807.0000000006692000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: C:\Users\user\AppData\Roaming\MultiDoge\multidoge.wallet
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: nRGT2oA3F8V3EBSM6dmMTrGw.exe, 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: set_UseMachineKeyStore
Source: NyiVs23yIO_0wMOj5TwwBpJ5.exe, 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp String found in binary or memory: |1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.json
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\ooon0i8sg2EZy1pci_ppgkth.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqlite
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\signons.sqlite
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\logins.json
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\signons.sqlite
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-wal
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\formhistory.sqlite
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\places.sqlite
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Exodus\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\MultiDoge\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Binance\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\config\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe File opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\backups\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\MultiDoge\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Binance\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\config\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\atomic\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Binance\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Exodus\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Guarda\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\eQEIduvtZVhzsp4oDFOuc1gy.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
Source: C:\Users\user\Documents\SimpleAdobe\NyiVs23yIO_0wMOj5TwwBpJ5.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000004
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
Source: C:\Users\user\Documents\SimpleAdobe\kPBjgT9TnN00tvBCDizDiq41.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Directory queried: C:\Users\user\Documents\SimpleAdobe Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Directory queried: C:\Users\user\Documents Jump to behavior
Source: C:\Users\user\Documents\SimpleAdobe\zFe0EAtgy56yDxXht4nmozfb.exe Directory queried: C:\Users\user\Documents\SimpleAdobe Jump to behavior
Source: Yara match File source: 0000000F.00000002.3015167493.0000000000447000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2976391613.0000000000EEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2970352519.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: zFe0EAtgy56yDxXht4nmozfb.exe PID: 2448, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: NyiVs23yIO_0wMOj5TwwBpJ5.exe PID: 3704, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 17.1.tXlQ3NLbQqxBkFS_TfaDHWX4.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000011.00000001.2435771287.0000000000843000.00000040.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000003.2405630696.0000000001C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3015167493.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.2626409081.00000000044AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.2397354655.0000000000D12000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
Source: Yara match File source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.aeac0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.80000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.cjlnYlPYSIAljKunxGKtil91.exe.aeac0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001D.00000002.2809504099.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.00000000044AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2626409081.000000000454D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2439089037.00000000000AE000.00000004.00000001.01000000.00000013.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2970352519.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 7.2.zFe0EAtgy56yDxXht4nmozfb.exe.9a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.eQEIduvtZVhzsp4oDFOuc1gy.exe.140000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000003.2850327356.00000000066F2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2852539306.00000000066F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: eQEIduvtZVhzsp4oDFOuc1gy.exe PID: 4160, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\J4dorNOROd60TEXKOpUsDEA.zip, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\YrWSGTvMbD1qxqADGULdj7d.zip, type: DROPPED
Source: Yara match File source: 00000017.00000002.2720784429.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.2724393718.0000000003961000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3022417132.0000000001CD5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: NyiVs23yIO_0wMOj5TwwBpJ5.exe PID: 3704, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.3.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1c00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.25eac0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.25eac0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.FSYOvyvMMT80PCsMousFK1Xa.exe.230000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.NyiVs23yIO_0wMOj5TwwBpJ5.exe.1bd0e67.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.3021827597.0000000001BD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2938091738.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2976391613.0000000000EEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000003.2405630696.0000000001C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2938091738.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.3015167493.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2435161937.000000000025E000.00000004.00000001.01000000.00000007.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: FSYOvyvMMT80PCsMousFK1Xa.exe PID: 3884, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: NyiVs23yIO_0wMOj5TwwBpJ5.exe PID: 3704, type: MEMORYSTR
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.nRGT2oA3F8V3EBSM6dmMTrGw.exe.456c010.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.nRGT2oA3F8V3EBSM6dmMTrGw.exe.d10000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe, type: DROPPED
Source: C:\Users\user\Documents\SimpleAdobe\nRGT2oA3F8V3EBSM6dmMTrGw.exe Code function: 10_2_69ACA0C0 CorBindToRuntimeEx,GetModuleHandleW,GetModuleHandleW,__cftoe,GetModuleHandleW,GetProcAddress, 10_2_69ACA0C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs