Click to jump to signature section
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: reset.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: Joe Sandbox View | IP Address: 208.95.112.1 208.95.112.1 |
Source: Joe Sandbox View | IP Address: 185.199.111.133 185.199.111.133 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: ip-api.com |
Source: global traffic | DNS traffic detected: DNS query: raw.githubusercontent.com |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 6BCD:277C4A:105DC62:14E74B7:67C6915CAccept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:29 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740038-EWRX-Cache: MISSX-Cache-Hits: 0X-Timer: S1741066589.042105,VS0,VE35Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: d1a75b155f60981db1539cfdb3ccd4dd71195e0bExpires: Tue, 04 Mar 2025 05:41:29 GMTSource-Age: 0 |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 6BCD:277C4A:105DC62:14E74B7:67C6915CAccept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:31 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740066-EWRX-Cache: HITX-Cache-Hits: 1X-Timer: S1741066592.884539,VS0,VE1Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: d42d2c2d001e44aa219c35540b552f5bc68000a1Expires: Tue, 04 Mar 2025 05:41:31 GMTSource-Age: 3 |
Source: global traffic | HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 79A4:1E905F:CBE4C0:100D8DD:67C69160Accept-Ranges: bytesDate: Tue, 04 Mar 2025 05:36:34 GMTVia: 1.1 varnishX-Served-By: cache-nyc-kteb1890028-NYCX-Cache: MISSX-Cache-Hits: 0X-Timer: S1741066595.730012,VS0,VE11Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: e2d3020ccd9622e2210fff2d654f7df3933c0eebExpires: Tue, 04 Mar 2025 05:41:34 GMTSource-Age: 0 |
Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004479000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=h |
Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: reset.exe, 00000004.00000002.3760159304.0000000004514000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004536000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004587000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://raw.githubusercontent.com |
Source: reset.exe, 00000004.00000002.3760159304.00000000043EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: reset.exe | String found in binary or memory: https://github.com/LimerBoy/StormKitty |
Source: reset.exe, 00000004.00000002.3760159304.0000000004501000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004536000.00000004.00000800.00020000.00000000.sdmp, reset.exe, 00000004.00000002.3760159304.0000000004587000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/AnonFileApi.1. |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49703 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49703 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: reset.exe, type: SAMPLE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 4.2.reset.exe.3bf0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 4.2.reset.exe.3bf0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 4.0.reset.exe.d20000.0.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: C:\Users\user\Desktop\reset.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C0568 | 4_2_00007FFAAC7C0568 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C76F8 | 4_2_00007FFAAC7C76F8 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C089D | 4_2_00007FFAAC7C089D |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C78E5 | 4_2_00007FFAAC7C78E5 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C0500 | 4_2_00007FFAAC7C0500 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7CB661 | 4_2_00007FFAAC7CB661 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C7AB3 | 4_2_00007FFAAC7C7AB3 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C7789 | 4_2_00007FFAAC7C7789 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C7C8F | 4_2_00007FFAAC7C7C8F |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7CB4B5 | 4_2_00007FFAAC7CB4B5 |
Source: C:\Users\user\Desktop\reset.exe | Code function: 4_2_00007FFAAC7C8CAE | 4_2_00007FFAAC7C8CAE |
Source: reset.exe, 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameStormKitty.exe* vs reset.exe |
Source: reset.exe | Binary or memory string: OriginalFilenameStormKitty.exe* vs reset.exe |
Source: reset.exe, type: SAMPLE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 4.2.reset.exe.3bf0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 4.2.reset.exe.3bf0000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 4.0.reset.exe.d20000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 00000004.00000002.3759956115.0000000003BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: reset.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: classification engine | Classification label: mal100.troj.spyw.evad.winEXE@1/1@2/2 |
Source: C:\Users\user\Desktop\reset.exe | Mutant created: NULL |
Source: C:\Users\user\Desktop\reset.exe | Mutant created: \Sessions\1\BaseNamedObjects\09B668B429A4BF3829B4833B450D1584 |
Source: reset.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: reset.exe | ReversingLabs: Detection: 71% |
Source: reset.exe | Virustotal: Detection: 41% |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: reset.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\reset.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController |
Source: reset.exe, 00000004.00000002.3760159304.00000000044F9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599859 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599738 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599616 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599500 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599400 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599284 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599153 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599030 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598914 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598798 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598682 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598566 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598428 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598297 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598181 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598065 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597927 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597795 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597679 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597563 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597448 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597297 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597089 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596726 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596334 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596197 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596072 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595958 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595824 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595702 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595586 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595470 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595238 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595100 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594992 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594884 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594768 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594648 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594536 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594398 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594282 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594166 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594050 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593919 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593796 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593680 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593564 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593448 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593332 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593194 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593078 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -28592453314249787s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599859s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599738s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599616s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599500s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599400s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599284s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599153s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -599030s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598914s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598798s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598682s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598566s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598428s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598297s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598181s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -598065s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597927s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597795s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597679s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597563s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597448s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597297s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -597089s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -596726s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -596334s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -596197s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -596072s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595958s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595824s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595702s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595586s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595470s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595343s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595238s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -595100s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594992s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594884s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594768s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594648s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594536s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594398s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594282s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594166s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -594050s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593919s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593796s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593680s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593564s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593448s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593332s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593194s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe TID: 7456 | Thread sleep time: -593078s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599859 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599738 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599616 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599500 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599400 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599284 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599153 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 599030 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598914 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598798 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598682 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598566 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598428 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598297 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598181 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 598065 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597927 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597795 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597679 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597563 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597448 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597297 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 597089 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596726 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596334 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596197 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 596072 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595958 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595824 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595702 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595586 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595470 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595343 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595238 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 595100 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594992 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594884 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594768 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594648 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594536 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594398 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594282 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594166 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 594050 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593919 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593796 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593680 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593564 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593448 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593332 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593194 | Jump to behavior |
Source: C:\Users\user\Desktop\reset.exe | Thread delayed: delay time: 593078 | Jump to behavior |
Source: reset.exe, 00000004.00000002.3760159304.00000000044F9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: reset.exe, 00000004.00000002.3760159304.00000000044F3000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VirtualMachine: |
Source: reset.exe, 00000004.00000002.3765243949.000000001EE90000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Electrum |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Jaxx5 |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Exodus\exodus.wallet |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Ethereum\keystore |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Exodus |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Ethereum |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Coinomi\Coinomi\wallets |
Source: reset.exe, 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Ethereum\keystore |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |
Source: Yara match | File source: 00000004.00000002.3760159304.0000000004071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: reset.exe PID: 3868, type: MEMORYSTR |