Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificates.starfieldtech.com/repository/0 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certificates.starfieldtech.com/repository/sfig2.crt0 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://certs.starfieldtech.com/repository/1402 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfi |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfieldte |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfieldtech.com/sfig2s1-775.crl0c |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfieldtech.com/sfroot-g2.crl0L |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfieldtech.com/sfroot.crl0L |
Source: Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.starfieldtex |
Source: Dropworm.exe, Dropworm.exe, 00000009.00000000.1699005074.0000000000409000.00000008.00000001.01000000.0000000E.sdmp, Dropworm.exe, 00000009.00000002.2047393619.0000000000409000.00000004.00000001.01000000.0000000E.sdmp, Dropworm.exe, 0000000C.00000002.2429535829.0000000000409000.00000008.00000001.01000000.0000000E.sdmp, 2Jq4fZJIJ8.exe, Dropworm.exe.0.dr | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: 2Jq4fZJIJ8.exe, Dropworm.exe.0.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.star |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.starfieldtech.com/08 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.starfieldtech.com/0; |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.starfieldtech.com/0F |
Source: Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.starfieldtechZ |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.starz |
Source: Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ogp.me/ns# |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.000000000341A000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.000000000342F000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://certs.starfieldtech.com/repository/0 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1904152654.00000000033DA000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1753723572.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2036442740.00000000033DC000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2219815466.0000000003423000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/ |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/04c |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/211 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.2162639450.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1997320279.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2072754690.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/? |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1663721780.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1663768139.00000000033DB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/AppData |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003423000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/C |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1904180717.000000000338C000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/H |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/M: |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/T |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin) |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin- |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin. |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin2 |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003387000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin: |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003387000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bin= |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033A3000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1904180717.00000000033A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binF |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binH |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1904180717.000000000338C000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.0000000003368000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binM |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binP |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1945858799.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binU |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binm |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003387000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binq |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033A3000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1904180717.00000000033A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.binr |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/d/MzdfMzIxNzQ4Mzhf/WbUFEtl105.bins |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/em32 |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2147922516.000000000342D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/f/MzdfMzIxNzQ4MzhfWGo3SW8?file_error=File |
Source: Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/l |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/o |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/od.lk/ |
Source: 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033D6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/or/ |
Source: Dropworm.exe, 0000000C.00000002.2433018640.00000000033C4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://od.lk/ws |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1904180717.00000000033C6000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web.opendrive.com/api/ |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1971631485.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1663721780.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2036334999.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033C6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1817986444.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2136016965.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1753723572.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2194439736.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2178764189.000000000341C000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web.opendrive.com/api/branding.json?user_id=2104337 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1971631485.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1663721780.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2036334999.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033C6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1817986444.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2136016965.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1753723572.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2194439736.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2178764189.000000000341C000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web.opendrive.com/api/download/file.json/MzdfMzIxNzQ4MzhfWGo3SW8?test=1&inline=0 |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1971631485.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1663721780.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2036334999.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033C6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1817986444.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2136016965.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1753723572.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2194439736.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2178764189.000000000341C000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433018640.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web.opendrive.com/api/file/info.json/MzdfMzIxNzQ4MzhfWGo3SW8?sharing_id= |
Source: 2Jq4fZJIJ8.exe, 00000008.00000003.1971631485.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1663721780.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2036334999.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000002.2432572239.00000000033C6000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1817986444.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2136016965.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.1753723572.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, 2Jq4fZJIJ8.exe, 00000008.00000003.2194439736.00000000033CF000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000003.2178764189.000000000341C000.00000004.00000020.00020000.00000000.sdmp, Dropworm.exe, 0000000C.00000002.2433540354.00000000050C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.opendrive.com |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 49733 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49727 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49725 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49729 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown | Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49735 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown | Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49733 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown | Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49730 |
Source: unknown | Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49730 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49726 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49729 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49727 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49726 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49725 |
Source: unknown | Network traffic detected: HTTP traffic on port 49735 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49723 |
Source: unknown | Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Code function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_004030D9 |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Code function: 8_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 8_2_004030D9 |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Code function: 9_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 9_2_004030D9 |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Code function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_004030D9 |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Code function: 8_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 8_2_004030D9 |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Code function: 9_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 9_2_004030D9 |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\2Jq4fZJIJ8.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Kunderegistrets\Dropworm.exe | Section loaded: ncryptsslp.dll | Jump to behavior |