Click to jump to signature section
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.4% probability |
Source: unknown | HTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: ZZZ.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2044965 - Severity 1 - ET MALWARE StormKitty Download Request With Minimal Headers : 192.168.2.5:49706 -> 185.199.109.133:443 |
Source: global traffic | TCP traffic: 192.168.2.5:50788 -> 162.159.36.2:53 |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: Joe Sandbox View | JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e |
Source: Network traffic | Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 185.199.109.133:443 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: ip-api.com |
Source: global traffic | DNS traffic detected: DNS query: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 8F70:28B767:15245B:1BEA9D:67C690A6Accept-Ranges: bytesDate: Tue, 04 Mar 2025 05:33:28 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740077-EWRX-Cache: MISSX-Cache-Hits: 0X-Timer: S1741066408.147151,VS0,VE10Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: f64fa7dca3157116c772fb3dca470eeacc07fb0dExpires: Tue, 04 Mar 2025 05:38:28 GMTSource-Age: 0 |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 8F70:28B767:15245B:1BEA9D:67C690A6Accept-Ranges: bytesDate: Tue, 04 Mar 2025 05:33:30 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740026-EWRX-Cache: HITX-Cache-Hits: 1X-Timer: S1741066411.783168,VS0,VE1Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 18894c5105b51d21133c89e1038d43048551abc8Expires: Tue, 04 Mar 2025 05:38:30 GMTSource-Age: 3 |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 8F70:28B767:15245B:1BEA9D:67C690A6Accept-Ranges: bytesDate: Tue, 04 Mar 2025 05:33:33 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740034-EWRX-Cache: HITX-Cache-Hits: 1X-Timer: S1741066413.352028,VS0,VE1Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 9ebcdb84edf8e9e16f07a1117d3cbad2e1966f7cExpires: Tue, 04 Mar 2025 05:38:33 GMTSource-Age: 5 |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004141000.00000004.00000800.00020000.00000000.sdmp, ZZZ.exe, 00000000.00000002.4482618110.00000000041CB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004141000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=h |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004141000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004263000.00000004.00000800.00020000.00000000.sdmp, ZZZ.exe, 00000000.00000002.4482618110.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, ZZZ.exe, 00000000.00000002.4482618110.0000000004285000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://raw.githubusercontent.com |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004141000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: ZZZ.exe | String found in binary or memory: https://github.com/LimerBoy/StormKitty |
Source: ZZZ.exe, 00000000.00000002.4482618110.00000000042D6000.00000004.00000800.00020000.00000000.sdmp, ZZZ.exe, 00000000.00000002.4482618110.0000000004285000.00000004.00000800.00020000.00000000.sdmp, ZZZ.exe, 00000000.00000002.4482618110.000000000424F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/AnonFileApi.1. |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13 |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | HTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: ZZZ.exe, type: SAMPLE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 0.0.ZZZ.exe.fa0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 0.2.ZZZ.exe.3910000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 0.2.ZZZ.exe.3910000.1.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 00000000.00000002.4482508613.0000000003910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: C:\Users\user\Desktop\ZZZ.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F30568 | 0_2_00007FF848F30568 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F3089D | 0_2_00007FF848F3089D |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F3B745 | 0_2_00007FF848F3B745 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F38E97 | 0_2_00007FF848F38E97 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F336D3 | 0_2_00007FF848F336D3 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F30500 | 0_2_00007FF848F30500 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F3B93E | 0_2_00007FF848F3B93E |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F335F2 | 0_2_00007FF848F335F2 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F331F2 | 0_2_00007FF848F331F2 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F3E411 | 0_2_00007FF848F3E411 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F3B8F4 | 0_2_00007FF848F3B8F4 |
Source: C:\Users\user\Desktop\ZZZ.exe | Code function: 0_2_00007FF848F37744 | 0_2_00007FF848F37744 |
Source: ZZZ.exe | Static PE information: No import functions for PE file found |
Source: ZZZ.exe, 00000000.00000002.4482508613.0000000003910000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameStormKitty.exe* vs ZZZ.exe |
Source: ZZZ.exe | Binary or memory string: OriginalFilenameStormKitty.exe* vs ZZZ.exe |
Source: ZZZ.exe, type: SAMPLE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 0.0.ZZZ.exe.fa0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 0.2.ZZZ.exe.3910000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 0.2.ZZZ.exe.3910000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 00000000.00000002.4482508613.0000000003910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: ZZZ.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: classification engine | Classification label: mal100.troj.spyw.evad.winEXE@1/1@2/2 |
Source: C:\Users\user\Desktop\ZZZ.exe | Mutant created: NULL |
Source: C:\Users\user\Desktop\ZZZ.exe | Mutant created: \Sessions\1\BaseNamedObjects\09B668B429A4BF3829B4833B450D1584 |
Source: ZZZ.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: ZZZ.exe | Static file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88% |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: ZZZ.exe | Virustotal: Detection: 75% |
Source: ZZZ.exe | ReversingLabs: Detection: 76% |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: ZZZ.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: ZZZ.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: ZZZ.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: ZZZ.exe | Static PE information: section name: .text entropy: 7.985393829764091 |
Source: C:\Users\user\Desktop\ZZZ.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: global traffic | HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004243000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599765 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599546 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599432 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599303 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599185 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599078 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598968 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598859 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598750 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598640 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598531 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598421 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598093 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597754 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597640 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597531 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597421 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597312 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597203 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597093 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596875 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596547 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596218 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596000 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595671 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595562 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595015 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594796 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -24903104499507879s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599765s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599656s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599546s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599432s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599303s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599185s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -599078s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598968s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598859s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598750s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598640s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598531s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598421s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598312s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598203s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -598093s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597984s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597875s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597754s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597640s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597531s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597421s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597312s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597203s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -597093s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596984s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596875s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596765s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596656s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596547s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596437s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596218s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596109s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -596000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595671s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -595015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -594906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -594796s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -594687s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe TID: 2928 | Thread sleep time: -594578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599765 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599656 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599546 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599432 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599303 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599185 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 599078 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598968 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598859 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598750 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598640 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598531 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598421 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598312 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598203 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 598093 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597984 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597875 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597754 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597640 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597531 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597421 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597312 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597203 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 597093 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596984 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596875 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596765 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596656 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596547 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596437 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596328 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596218 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596109 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 596000 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595890 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595781 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595671 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595562 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595453 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595234 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595125 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 595015 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594906 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594796 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594687 | Jump to behavior |
Source: C:\Users\user\Desktop\ZZZ.exe | Thread delayed: delay time: 594578 | Jump to behavior |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000004243000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VirtualMachine: |
Source: ZZZ.exe, 00000000.00000002.4486114505.000000001EC44000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Electrum |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Jaxx5 |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Exodus\exodus.wallet |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Ethereum\keystore |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Exodus |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Ethereum |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Coinomi\Coinomi\wallets |
Source: ZZZ.exe, 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Ethereum\keystore |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |
Source: Yara match | File source: 00000000.00000002.4482618110.0000000003DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ZZZ.exe PID: 6352, type: MEMORYSTR |