Source: https://chneiu.icu/qZzaQfFD/epGfV132.binB | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binK6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/ | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binF | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/82& | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/neiu.icu/qZzaQfFD/epGfV132.binR | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.bino6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binnK6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binR6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binL6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binn | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binnR6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.binno6 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.bin | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/neiu.icu/qZzaQfFD/epGfV132.bin | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.bin3 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/5 | Avira URL Cloud: Label: malware |
Source: https://chneiu.icu/qZzaQfFD/epGfV132.bins | Avira URL Cloud: Label: malware |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00405E7C FindFirstFileA,FindClose, | 0_2_00405E7C |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00405438 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 0_2_00405438 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00402645 FindFirstFileA, | 8_2_00402645 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00405E7C FindFirstFileA,FindClose, | 8_2_00405E7C |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00405438 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 8_2_00405438 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49700 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49691 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49696 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49697 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49699 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49695 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49692 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49694 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49693 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49690 -> 188.114.97.3:443 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49698 -> 188.114.97.3:443 |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /qZzaQfFD/epGfV132.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: chneiu.icuCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:20:28 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeServer: cloudflareCF-RAY: 91cc73488ec8cef1-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:20:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rhkva6vRwfCYLJFhG7fHAaT6GhfaCgvzO5JDjcPS1cTz7se3VQamr1GgliNVbgc8afK5DqmNjSAaPN%2Fi%2BGnf3wH2a6mrBREFveaRSVlH7qOTqy9DA0AVDsdSAL7E"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc7399cb3d22ea-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:20:53 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=snYTLnrbf%2Bh1DEaZkcJ%2F0Q%2BEqDuZUYipV4LxmcZvg9im%2BWBTFwhA3%2F5wYKY4SIzasQUNyOBAUj%2BHPcR91qAhIlCRdxZ2yv%2BHNWj0gdCOD9cORFIa4TyGIBGEgTXf"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc73e9291ace60-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:21:07 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QPA18j5hgsgqwEyCxms%2FIBcWSPJHrMXJPtCZVPsVcXQ6ZEPLg7QoEH2w%2FNqF8efn70cC8MYJeJ7NwR9af%2FVlz8wbqMPGjwrxjhLPn6aY1cFcBlpxNdFiybNINo9p"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc743bae57ed3c-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:21:19 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AsoM0e55Me%2FPxoD5NhbXMKjK358kD92a5fzekIjJwQDia9OlzkX43kkGmPEtrQQFy1v91%2Fw%2BGMSsQF2Gg7r7gM8D7fwHHu9oKx5DYMAD3jQh0F9Y8Eg%2F7a%2F2H5b%2F"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc74883a74cf9b-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:21:31 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeServer: cloudflareCF-RAY: 91cc74d698d8fb28-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:21:44 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZvunwptWTXSP2yvJDLagQ8cSgOJW%2FkC%2FbYmVBi7h2xPeqfn%2FaX87X8Y9df4Ko2aM8O2nf97fZTsvI4WvXfTSHZcN7C2guktCOG0lAgXfvItZQVzSDM4zejIiPiQv"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc75273cdc26b0-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:21:57 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iQ3bl8owIQ6CBJc6VeVB402TF5RPLcjN2%2FsbJYpctfRzis5w2qh5V1XsR3vBdakIWegh2nuuWmQ5luObXJR0ZaLaW4GI8XcdwsUL8WLvUFprivT745TMHUfauocV"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc7577dd3a176d-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:22:10 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z21RIITY9SQSdrFtxot%2F28OX9ls7666HPP62l3tzgxAecScESpldN0RH1HHh0ci6zSZ%2Fnt1shMG%2B9KhaSGTQ2rcgMTqC8BXnLWPcQaqA8MKIAX8TcTMXKVWdl6FS"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc75c6e8b2ed3d-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:22:22 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mSKLJ27X0o%2FgOtmqU5A22EAGjYBEThNh1FsuAKkN9l5Ypa9hQRPL1zq7eG9nqm%2F0LC7fMLpB%2B0mzG3F45anL0uV3hoyMPExJ7GUNQvEtTVuT4WexjLWZFXzQrl1g"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc76154ee79e68-SJC |
Source: global traffic | HTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 07 Mar 2025 19:22:35 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OvX7MFqgzHoAFXXqHi3BCdzD4%2BwPpBq1pgLgxCiS%2FG4M7MUgupR%2FerC3cRHx3l%2Bxkhhny16Cw7p%2FQUUJ8FtYso5%2BTlkVWlJOi7d4El%2FZ1J2pD36tiwfOK%2FZxD5Fu"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cc7662bd60faba-SJC |
Source: employee record_pdf.bat.exe | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: employee record_pdf.bat.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: employee record_pdf.bat.exe, 00000008.00000003.2100675939.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593756957.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/ |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/5 |
Source: employee record_pdf.bat.exe, 00000008.00000003.1852744850.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1721057703.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2780958190.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2485070890.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1720947412.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734376728.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852661877.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100787326.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100675939.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/82& |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/neiu.icu/qZzaQfFD/epGfV132.bin |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A43000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/neiu.icu/qZzaQfFD/epGfV132.binR |
Source: employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A58000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100822549.0000000004A57000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852804129.0000000004A56000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A2E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.bin |
Source: employee record_pdf.bat.exe, 00000008.00000003.1593682750.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593756957.0000000004A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.bin3 |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A2F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A2E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binB |
Source: employee record_pdf.bat.exe, 00000008.00000003.1852744850.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852661877.0000000004A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binF |
Source: employee record_pdf.bat.exe, 00000008.00000003.1721057703.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593682750.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1720947412.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593756957.0000000004A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binK6 |
Source: employee record_pdf.bat.exe, 00000008.00000003.2358670756.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229682096.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2358763714.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2780958190.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2485070890.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975199505.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975132131.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734376728.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100787326.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229776945.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100675939.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binL6 |
Source: employee record_pdf.bat.exe, 00000008.00000003.1975199505.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975132131.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100787326.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100675939.0000000004A76000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binR6 |
Source: employee record_pdf.bat.exe, 00000008.00000003.2358670756.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852744850.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229682096.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2358763714.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1721057703.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2780958190.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2485070890.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975199505.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975132131.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1720947412.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734376728.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852661877.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100787326.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229776945.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100675939.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binn |
Source: employee record_pdf.bat.exe, 00000008.00000003.2229682096.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229776945.0000000004A75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binnK6 |
Source: employee record_pdf.bat.exe, 00000008.00000003.2358670756.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2358763714.0000000004A75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binnR6 |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780958190.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734376728.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.binno6 |
Source: employee record_pdf.bat.exe, 00000008.00000003.2358670756.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852744850.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229682096.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2358763714.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1721057703.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593682750.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2485070890.0000000004A76000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1720947412.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852661877.0000000004A77000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229776945.0000000004A75000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1593756957.0000000004A77000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.bino6 |
Source: employee record_pdf.bat.exe, 00000008.00000002.2780958190.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734376728.0000000004A6F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://chneiu.icu/qZzaQfFD/epGfV132.bins |
Source: employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2229812517.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975233074.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1852661877.0000000004A68000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2358670756.0000000004A68000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2781213520.0000000006630000.00000004.00000800.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100822549.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2610706283.0000000004A68000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1720947412.0000000004A68000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2485070890.0000000004A68000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.cloudflare.com/5xx-error-landing |
Source: employee record_pdf.bat.exe, 00000008.00000003.1852804129.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2734467600.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.1975233074.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2781213520.0000000006630000.00000004.00000800.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000002.2780876766.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp, employee record_pdf.bat.exe, 00000008.00000003.2100822549.0000000004A5E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/ |
Source: unknown | Network traffic detected: HTTP traffic on port 49698 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49698 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49697 |
Source: unknown | Network traffic detected: HTTP traffic on port 49695 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49696 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49695 |
Source: unknown | Network traffic detected: HTTP traffic on port 49694 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49694 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49693 |
Source: unknown | Network traffic detected: HTTP traffic on port 49696 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49697 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49692 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49691 |
Source: unknown | Network traffic detected: HTTP traffic on port 49692 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49693 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49690 |
Source: unknown | Network traffic detected: HTTP traffic on port 49691 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49690 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00404FA1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard, | 0_2_00404FA1 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 0_2_004030B6 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess, | 8_2_004030B6 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00405E7C FindFirstFileA,FindClose, | 0_2_00405E7C |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00405438 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 0_2_00405438 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 0_2_00402645 FindFirstFileA, | 0_2_00402645 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00402645 FindFirstFileA, | 8_2_00402645 |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00405E7C FindFirstFileA,FindClose, | 8_2_00405E7C |
Source: C:\Users\user\Desktop\employee record_pdf.bat.exe | Code function: 8_2_00405438 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose, | 8_2_00405438 |