Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe

Overview

General Information

Sample name:#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe
renamed because original name is a hash value
Original sample name:.exe
Analysis ID:1640090
MD5:5f3d1f1e17afc55fd804807831cb837c
SHA1:120e0c815da5bb2fd03e7cc582c81ee70e1ddab9
SHA256:0c06255e9c03f387f96c7a225b6b8f39021b1d03976e9764fa2adf7d46e9cc6a
Tags:exesalityvirususer-2huMarisa
Infos:

Detection

Score:45
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Query firmware table information (likely to detect VMs)
Detected non-DNS traffic on DNS port
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
Uses 32bit PE files

Classification

  • System is w10x64
  • #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe" MD5: 5F3D1F1E17AFC55FD804807831CB837C)
    • explorer.exe (PID: 7112 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 2328 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 3188 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 3380 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 904 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4256 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 636 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4324 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4384 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 5500 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4088 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4972 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7068 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4348 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 1428 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4320 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 4844 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7228 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7372 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7508 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7572 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7728 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7852 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7900 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 7988 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • explorer.exe (PID: 8020 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • explorer.exe (PID: 7124 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • explorer.exe (PID: 2864 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • rundll32.exe (PID: 4504 cmdline: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • explorer.exe (PID: 7584 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeVirustotal: Detection: 76%Perma Link
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeReversingLabs: Detection: 69%
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 204.79.197.203:443 -> 192.168.2.9:49683 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.203:443 -> 192.168.2.9:64297 version: TLS 1.2

Networking

barindex
Source: C:\Windows\explorer.exeNetwork Connect: 204.79.197.203 443Jump to behavior
Source: global trafficTCP traffic: 192.168.2.9:64281 -> 162.159.36.2:53
Source: global trafficHTTP traffic detected: GET /v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=windows-windowsShell-feeds&osLocale=en-GB&CheckEnable=true&activityId=0D619E9D-00BF-4492-8B6E-0F7EE704ACB1&user=m-1bc49ddbecab44279c9cec83d08a0544 HTTP/1.1Host: api.msn.comCookie: sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=67caf6a28fbd41f98b6ce7294c3fa0bf.RefC=2025-03-07T13:37:38Z; MUIDB=3C8465A2A1AF64E315E3700AA0AE654D; _EDGE_V=1; MUID=3C8465A2A1AF64E315E3700AA0AE654D
Source: global trafficHTTP traffic detected: GET /v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=windows-windowsShell-feeds&osLocale=en-GB&CheckEnable=true&activityId=DB0D867D-626E-41E6-A727-8368BB5EE579&user=m-df6c07cae25243818377d7e5b0263a10 HTTP/1.1Host: api.msn.comCookie: sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=67caf6a28fbd41f98b6ce7294c3fa0bf.RefC=2025-03-07T13:37:38Z; MUIDB=3C8465A2A1AF64E315E3700AA0AE654D; _EDGE_V=1; MUID=3C8465A2A1AF64E315E3700AA0AE654D
Source: Joe Sandbox ViewIP Address: 204.79.197.203 204.79.197.203
Source: Joe Sandbox ViewIP Address: 204.79.197.203 204.79.197.203
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=windows-windowsShell-feeds&osLocale=en-GB&CheckEnable=true&activityId=0D619E9D-00BF-4492-8B6E-0F7EE704ACB1&user=m-1bc49ddbecab44279c9cec83d08a0544 HTTP/1.1Host: api.msn.comCookie: sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=67caf6a28fbd41f98b6ce7294c3fa0bf.RefC=2025-03-07T13:37:38Z; MUIDB=3C8465A2A1AF64E315E3700AA0AE654D; _EDGE_V=1; MUID=3C8465A2A1AF64E315E3700AA0AE654D
Source: global trafficHTTP traffic detected: GET /v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=windows-windowsShell-feeds&osLocale=en-GB&CheckEnable=true&activityId=DB0D867D-626E-41E6-A727-8368BB5EE579&user=m-df6c07cae25243818377d7e5b0263a10 HTTP/1.1Host: api.msn.comCookie: sptmarket=en-GB||us|en-us|en-us|en||cf=8|RefA=67caf6a28fbd41f98b6ce7294c3fa0bf.RefC=2025-03-07T13:37:38Z; MUIDB=3C8465A2A1AF64E315E3700AA0AE654D; _EDGE_V=1; MUID=3C8465A2A1AF64E315E3700AA0AE654D
Source: global trafficDNS traffic detected: DNS query: api.msn.com
Source: global trafficDNS traffic detected: DNS query: c.pki.goog
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: explorer.exe, 00000007.00000002.1220482577.00000000088CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: explorer.exe, 00000007.00000002.1220482577.00000000088CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: explorer.exe, 00000003.00000002.981741320.0000000004BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.
Source: explorer.exe, 00000007.00000002.1220482577.00000000088CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe, 00000000.00000000.909858927.0000000000CEA000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
Source: explorer.exe, 00000007.00000002.1243748283.000000000D21E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: explorer.exe, 00000007.00000002.1243748283.000000000D261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
Source: explorer.exe, 00000007.00000002.1220482577.0000000008772000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/$w
Source: explorer.exe, 00000007.00000002.1220482577.0000000008772000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/Xw
Source: explorer.exe, 00000007.00000002.1212129172.0000000007807000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1219993313.00000000085E0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000007.00000002.1220482577.0000000008772000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?SAb
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=A1668CA4549A443399161CE8D2237D12&timeOut=5000&oc
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.000000000787C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 00000007.00000002.1220482577.0000000008772000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comY
Source: explorer.exe, 00000007.00000002.1177774300.0000000004878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weath
Source: explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
Source: explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb-dark
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv-dark
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8-dark
Source: explorer.exe, 00000007.00000002.1219993313.00000000085E0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
Source: explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1eBTmz.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hGNsX.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAT0qC2.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AATs0AB.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1e6XdQ.img
Source: explorer.exe, 00000007.00000002.1177774300.0000000004878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1gJOWA.img
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://parade.com/61481/toriavey/where-did-hamburgers-originate
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000007.00000002.1230565795.0000000008A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/foodanddrink/foodnews/the-best-burger-place-in-phoenix-plus-see-the-rest-o
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/companies/kaiser-permanente-and-unions-for-75-000-striking-health-wo
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-o
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-whines-to-cameras-in-ny-fraud-case-before-fleeing-to-f
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/a-second-war-could-easily-erupt-in-europe-while-everyone-s-dist
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/england-considers-raising-smoking-age-until-cigarettes-are-bann
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/nobel-prize-in-literature-to-be-announced-in-stockholm/ar-AA1hI
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-expresses-worry-about-congressional
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.stacker.com/arizona/phoenix
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.starsinsider.com/n/154870?utm_source=msn.com&utm_medium=display&utm_campaign=referral_de
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.1212129172.0000000007730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yelp.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64297
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64297 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
Source: unknownHTTPS traffic detected: 204.79.197.203:443 -> 192.168.2.9:49683 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.203:443 -> 192.168.2.9:64297 version: TLS 1.2
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal45.evad.winEXE@156/5@6/1
Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000017.dbJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeVirustotal: Detection: 76%
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeReversingLabs: Detection: 69%
Source: unknownProcess created: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe "C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe"
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -EmbeddingJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: ksuser.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: audioses.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeSection loaded: midimap.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: idstore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wlidprov.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sndvolsso.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appextension.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cldapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: tiledatarepository.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: staterepository.core.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepository.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: languageoverlayutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.pcshell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wincorlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.immersiveshell.serviceprovider.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: photometadatahandler.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: applicationframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: structuredquery.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mswb7.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: structuredquery.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mswb7.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: structuredquery.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mswb7.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: icu.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.search.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: idstore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wlidprov.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sndvolsso.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cldapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: tiledatarepository.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: staterepository.core.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepository.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: languageoverlayutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appextension.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.pcshell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wincorlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.immersiveshell.serviceprovider.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: photometadatahandler.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cscui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: provsvc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: applicationframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: holographicextensions.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: virtualmonitormanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: abovelockapphost.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: npsm.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.shell.bluelightreduction.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mscms.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.internal.signals.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: tdh.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.web.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mfplat.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: rtworkq.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.data.activities.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.security.authentication.web.core.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.system.launcher.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.internal.ui.shell.windowtabmanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: notificationcontrollerps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.devices.enumeration.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: icu.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mswb7.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: devdispitemprovider.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.networking.connectivity.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.core.textinput.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uianimation.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowsudk.shellcommon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dictationmanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorybroker.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: pcshellcommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: shellcommoncommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptngc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cflapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: daxexec.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: container.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.fileexplorer.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uiribbon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: stobject.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wmiclnt.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: batmeter.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: inputswitch.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: prnfldr.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.shell.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: edputil.dll
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic file information: File size 9216000 > 1048576
Source: #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x84a000
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformation
Source: explorer.exe, 00000007.00000003.980504360.00000000078F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
Source: explorer.exe, 00000007.00000003.980353436.00000000086DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000007.00000002.1220482577.0000000008896000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: explorer.exe, 00000003.00000002.964788720.0000000000E03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000bf
Source: explorer.exe, 00000007.00000002.1139582935.0000000000EC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000AD
Source: explorer.exe, 00000007.00000002.1139582935.0000000000EC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000007.00000002.1212129172.000000000787C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTpVMWare
Source: explorer.exe, 00000007.00000002.1220482577.00000000088FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: explorer.exe, 00000003.00000003.963806713.0000000007A56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\EK
Source: explorer.exe, 00000007.00000002.1139582935.0000000000EC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000yEf
Source: explorer.exe, 00000003.00000002.964788720.0000000000E03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: explorer.exe, 00000003.00000003.963806713.0000000007A56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\#U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exeNetwork Connect: 204.79.197.203 443Jump to behavior
Source: explorer.exe, 00000003.00000002.992732123.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.961653911.00000000078F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.986699169.0000000004C80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000003.00000002.986699169.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.963806713.00000000079A3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.956203276.00000000079A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
Source: explorer.exe, 00000003.00000002.964788720.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0Progman
Source: explorer.exe, 00000003.00000003.956203276.00000000079A3000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.957144254.00000000079B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanP
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
12
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640090 Sample: #U6d59#U6c5f#U6eab#U5dde#U7... Startdate: 16/03/2025 Architecture: WINDOWS Score: 45 25 pki-goog.l.google.com 2->25 27 c.pki.goog 2->27 29 8 other IPs or domains 2->29 33 Multi AV Scanner detection for submitted file 2->33 7 explorer.exe 14 124 2->7         started        11 #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exe 2->11         started        13 explorer.exe 66 2->13         started        15 2 other processes 2->15 signatures3 process4 dnsIp5 31 a-0003.a-msedge.net 204.79.197.203, 443, 49683, 64297 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->31 35 System process connects to network (likely due to code injection or exploit) 7->35 37 Query firmware table information (likely to detect VMs) 7->37 17 explorer.exe 5 5 11->17         started        19 explorer.exe 1 11->19         started        21 explorer.exe 4 11->21         started        23 23 other processes 11->23 signatures6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.