Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/a | Avira URL Cloud: Label: malware |
Source: http://93.88.203.34/cl/BatClipT.bat.226/P | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/R | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Y | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226/p | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/U | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/N | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/V | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDj | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OID | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/M | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226/ | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/any | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/; | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8 | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3 | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226/: | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/( | Avira URL Cloud: Label: malware |
Source: http://93.88.203.34/cl/BatClipT | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/ | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226/. | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$# | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226/6e7660115d80/ | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/ | Avira URL Cloud: Label: malware |
Source: http://93.88.203.34/cl/BatClipT.bat | Avira URL Cloud: Label: malware |
Source: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/s | Avira URL Cloud: Label: malware |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.208.159.226 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226/ |
Source: explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226/. |
Source: explorer.exe, 00000006.00000002.2695319275.000002072723A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226/6e7660115d80/ |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226/: |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226/p |
Source: explorer.exe, 00000006.00000002.2695142393.000002072714C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/ |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/( |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/3 |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/8 |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/80/ |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/; |
Source: 1776871603.exe, 00000000.00000003.1474147972.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/M |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/N |
Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OID |
Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474147972.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/OIDj |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/P$# |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/R |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/U |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/V |
Source: 1776871603.exe, 00000000.00000003.1474426819.00000294FB8BB000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/Y |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/a |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB8B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/any |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.208.159.226:8888/d53f8fa2ef2f4fcabd436e7660115d80/s |
Source: explorer.exe, 00000006.00000002.2694983774.00000014809A8000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://185.208.k |
Source: explorer.exe, 00000006.00000002.2695434254.0000020728F44000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://93.88.203.34/cl/BatClipT |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://93.88.203.34/cl/BatClipT.bat |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://93.88.203.34/cl/BatClipT.bat.226/P |
Source: 1776871603.exe, explorer.exe.0.dr | String found in binary or memory: http://ip-api.com/line/ |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/- |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000003.1474310515.00000294FB88F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?j |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/E |
Source: 1776871603.exe, explorer.exe.0.dr | String found in binary or memory: http://ip-api.com/line/RUBYUA797739A5A68043409FBEC5CFF63BE680UwwEUQtfIAckUApWAFVXUVsidnZ1UHRwcAYCc3B |
Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/ |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/$Nj? |
Source: explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/G |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/JN4? |
Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/KbM |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.0000020727214000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code#9 |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code1 |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code1n |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code2 |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Code89 |
Source: 1776871603.exe, 00000000.00000002.1495612161.00000294FB81C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeL |
Source: 1776871603.exe, 00000000.00000003.1474310515.00000294FB898000.00000004.00000020.00020000.00000000.sdmp, 1776871603.exe, 00000000.00000002.1495612161.00000294FB898000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeLf |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/CodeM32 |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codea9 |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codei |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codeindows |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271E1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codemn |
Source: explorer.exe, 00000006.00000002.2695142393.00000207271A8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/VeraImage/MilitarySource/refs/heads/main/Codev9 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A5C40 | 0_2_00007FF7612A5C40 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A7A40 | 0_2_00007FF7612A7A40 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A8E80 | 0_2_00007FF7612A8E80 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AB260 | 0_2_00007FF7612AB260 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612ABE60 | 0_2_00007FF7612ABE60 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612ABCC0 | 0_2_00007FF7612ABCC0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A78A0 | 0_2_00007FF7612A78A0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612ACAA0 | 0_2_00007FF7612ACAA0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AF0A0 | 0_2_00007FF7612AF0A0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AB900 | 0_2_00007FF7612AB900 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A7740 | 0_2_00007FF7612A7740 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AE540 | 0_2_00007FF7612AE540 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A3780 | 0_2_00007FF7612A3780 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AA180 | 0_2_00007FF7612AA180 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AA172 | 0_2_00007FF7612AA172 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AED70 | 0_2_00007FF7612AED70 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AB760 | 0_2_00007FF7612AB760 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AA9B0 | 0_2_00007FF7612AA9B0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AB5A0 | 0_2_00007FF7612AB5A0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612A95A0 | 0_2_00007FF7612A95A0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AE400 | 0_2_00007FF7612AE400 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612ABFF0 | 0_2_00007FF7612ABFF0 |
Source: C:\Users\user\Desktop\1776871603.exe | Code function: 0_2_00007FF7612AEFE2 | 0_2_00007FF7612AEFE2 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEE400 | 6_2_00007FF6E0CEE400 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEBFF0 | 6_2_00007FF6E0CEBFF0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEEFE2 | 6_2_00007FF6E0CEEFE2 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEA180 | 6_2_00007FF6E0CEA180 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE3780 | 6_2_00007FF6E0CE3780 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEA9B0 | 6_2_00007FF6E0CEA9B0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEB5A0 | 6_2_00007FF6E0CEB5A0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE95A0 | 6_2_00007FF6E0CE95A0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEE540 | 6_2_00007FF6E0CEE540 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE7740 | 6_2_00007FF6E0CE7740 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEA172 | 6_2_00007FF6E0CEA172 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEED70 | 6_2_00007FF6E0CEED70 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEB760 | 6_2_00007FF6E0CEB760 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEB900 | 6_2_00007FF6E0CEB900 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEBCC0 | 6_2_00007FF6E0CEBCC0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE8E80 | 6_2_00007FF6E0CE8E80 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CECAA0 | 6_2_00007FF6E0CECAA0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEF0A0 | 6_2_00007FF6E0CEF0A0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE78A0 | 6_2_00007FF6E0CE78A0 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE5C40 | 6_2_00007FF6E0CE5C40 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CE7A40 | 6_2_00007FF6E0CE7A40 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEB260 | 6_2_00007FF6E0CEB260 |
Source: C:\Users\user\AppData\Local\explorer.exe | Code function: 6_2_00007FF6E0CEBE60 | 6_2_00007FF6E0CEBE60 |
Source: unknown | Process created: C:\Users\user\Desktop\1776871603.exe "C:\Users\user\Desktop\1776871603.exe" | |
Source: C:\Users\user\Desktop\1776871603.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Local\explorer.exe C:\Users\user\AppData\Local\explorer.exe | |
Source: unknown | Process created: C:\Users\user\AppData\Local\explorer.exe "C:\Users\user\AppData\Local\explorer.exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Local\explorer.exe "C:\Users\user\AppData\Local\explorer.exe" | |
Source: C:\Users\user\Desktop\1776871603.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "ping localhost -n 1 && start C:\Users\user\AppData\Local\explorer.exe" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 1 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Local\explorer.exe C:\Users\user\AppData\Local\explorer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1776871603.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\explorer.exe | Section loaded: kernel.appcore.dll | Jump to behavior |