Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: unknown | TCP traffic detected without corresponding DNS query: 134.255.220.10 |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://cacerts.digicert.com/CloudflareIncRSACA-2.crt0 |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/CloudflareIncRSACA-2.crl07 |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://crl4.digicert.com/CloudflareIncRSACA-2.crl0L |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: WindowsService.exe, 00000005.00000002.498465437.0000000002A19000.00000004.00000001.sdmp | String found in binary or memory: http://pastebin.com |
Source: 02hcrdNuG6.exe, 00000000.00000002.246691900.0000000002B21000.00000004.00000001.sdmp, WindowsService.exe, 00000005.00000002.498378776.00000000029DC000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: WindowsService.exe, 00000005.00000002.498378776.00000000029DC000.00000004.00000001.sdmp | String found in binary or memory: https://pastebin.com |
Source: WindowsService.exe, 00000005.00000002.498744035.0000000002B00000.00000004.00000001.sdmp | String found in binary or memory: https://pastebin.com/raw/FQ6Mj5L5 |
Source: WindowsService.exe, 00000005.00000002.498744035.0000000002B00000.00000004.00000001.sdmp | String found in binary or memory: https://pastebin.comD8 |
Source: WindowsService.exe, 00000005.00000002.498586566.0000000002A5A000.00000004.00000001.sdmp, WindowsService.exe, 00000005.00000002.498465437.0000000002A19000.00000004.00000001.sdmp | String found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: Yara match | File source: 02hcrdNuG6.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.227121610.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000000.247272904.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000000.245889872.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246717553.0000000002B3C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.495518458.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.261807095.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246107724.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 02hcrdNuG6.exe PID: 5480, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6236, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6368, type: MEMORY |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe, type: DROPPED |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.0.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.0.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.unpack, type: UNPACKEDPE |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Code function: 0_2_02A0B0B8 | 0_2_02A0B0B8 |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Code function: 0_2_02A0D068 | 0_2_02A0D068 |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Code function: 0_2_02A0A4A0 | 0_2_02A0A4A0 |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Code function: 0_2_02A0A7E8 | 0_2_02A0A7E8 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 5_2_0105B0B8 | 5_2_0105B0B8 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 5_2_0105A4A0 | 5_2_0105A4A0 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 5_2_0105A7E8 | 5_2_0105A7E8 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 6_2_014DD078 | 6_2_014DD078 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 6_2_014DB0B8 | 6_2_014DB0B8 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 6_2_014DA4A0 | 6_2_014DA4A0 |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Code function: 6_2_014DA7E8 | 6_2_014DA7E8 |
Source: 02hcrdNuG6.exe, ??????????/????????.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 02hcrdNuG6.exe, ??????????/????????.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock' |
Source: WindowsService.exe.0.dr, ??????????/????????.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: WindowsService.exe.0.dr, ??????????/????????.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock' |
Source: 0.0.02hcrdNuG6.exe.850000.0.unpack, ??????????/????????.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.0.02hcrdNuG6.exe.850000.0.unpack, ??????????/????????.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock' |
Source: 0.2.02hcrdNuG6.exe.850000.0.unpack, ??????????/????????.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.02hcrdNuG6.exe.850000.0.unpack, ??????????/????????.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock' |
Source: 02hcrdNuG6.exe, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: WindowsService.exe.0.dr, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 0.0.02hcrdNuG6.exe.850000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 0.2.02hcrdNuG6.exe.850000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 5.0.WindowsService.exe.740000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 5.2.WindowsService.exe.740000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 6.0.WindowsService.exe.b40000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: 6.2.WindowsService.exe.b40000.0.unpack, ????????/??????????????.cs | Base64 encoded string: 'lIV5OVWm5X9grmK3OIzJ8FuDYpl793CoGrCN/6zL647Vo7Ubht0KB0YlAoEguiQR' |
Source: WindowsService.exe.0.dr, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: WindowsService.exe.0.dr, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 6.2.WindowsService.exe.b40000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 6.2.WindowsService.exe.b40000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.2.WindowsService.exe.740000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 5.2.WindowsService.exe.740000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 6.0.WindowsService.exe.b40000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 6.0.WindowsService.exe.b40000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 0.0.02hcrdNuG6.exe.850000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 0.0.02hcrdNuG6.exe.850000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 5.0.WindowsService.exe.740000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 5.0.WindowsService.exe.740000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 0.2.02hcrdNuG6.exe.850000.0.unpack, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 0.2.02hcrdNuG6.exe.850000.0.unpack, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 02hcrdNuG6.exe, ?????????/??????.cs | Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 02hcrdNuG6.exe, ?????????/??????.cs | Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: Yara match | File source: 02hcrdNuG6.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.227121610.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000000.247272904.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000000.245889872.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246717553.0000000002B3C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.495518458.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.261807095.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246107724.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 02hcrdNuG6.exe PID: 5480, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6236, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6368, type: MEMORY |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe, type: DROPPED |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.0.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.0.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.unpack, type: UNPACKEDPE |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Yara match | File source: 02hcrdNuG6.exe, type: SAMPLE |
Source: Yara match | File source: 00000000.00000000.227121610.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000000.247272904.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000000.245889872.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246717553.0000000002B3C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.495518458.0000000000742000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.261807095.0000000000B42000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.246107724.0000000000852000.00000002.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 02hcrdNuG6.exe PID: 5480, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6236, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WindowsService.exe PID: 6368, type: MEMORY |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe, type: DROPPED |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.0.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.2.WindowsService.exe.b40000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.0.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.02hcrdNuG6.exe.850000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 5.2.WindowsService.exe.740000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.02hcrdNuG6.exe.2b3c494.1.unpack, type: UNPACKEDPE |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard |
Source: C:\Users\user\Desktop\02hcrdNuG6.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\AppData\Local\Temp\Windows\WindowsService.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: WindowsService.exe, 00000005.00000002.503301465.00000000069FE000.00000004.00000001.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareROCCZ3Y3Win32_VideoController1LZYUHYHVideoController120060621000000.000000-0001822.241display.infMSBDAKLCB9GXNPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsHOP88G9N' |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | Binary or memory string: VMware |
Source: WindowsService.exe, 00000005.00000002.496372467.0000000000C34000.00000004.00000020.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareROCCZ3Y3Win32_VideoController1LZYUHYHVideoController120060621000000.000000-0001822.241display.infMSBDAKLCB9GXNPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsHOP88G9NG2 |
Source: WindowsService.exe, 00000005.00000002.503222070.0000000006960000.00000004.00000001.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareROCCZ3Y3Win32_VideoController1LZYU |
Source: 02hcrdNuG6.exe | Binary or memory string: vmware |
Source: WindowsService.exe | Binary or memory string: \vboxhook.dll |
Source: WindowsService.exe, 00000005.00000002.496372467.0000000000C34000.00000004.00000020.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareROCCZ3Y3Win32_VideoController1LZYUHYHVideoController120060621000000.000000-0001822.241display.infMSBDAKLCB9GXNPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsHOP88G9N!4 |
Source: 02hcrdNuG6.exe | Binary or memory string: \vboxhook.dllQY21kLmV4ZSAvYyBwaW5nIDAgLW4gMiAmIGRlbCA= |
Source: WindowsService.exe, 00000005.00000002.496372467.0000000000C34000.00000004.00000020.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareROCCZ3Y3Win32_VideoController1LZYUHYHVideoController120060621000000.000000-0001822.241display.infMSBDAKLCB9GXNPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsHOP88G9N |
Source: WindowsService.exe, 00000005.00000002.503301465.00000000069FE000.00000004.00000001.sdmp | Binary or memory string: (Standard display types)VMwareROCCZ3Y3Win32_VideoC" |
Source: 02hcrdNuG6.exe, 00000000.00000002.246488614.0000000000EA4000.00000004.00000020.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:I |