Click to jump to signature section
Source: | Binary string: system.windows.forms.dll.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Windows.Forms.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4AE1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbL- source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\nazar\Desktop\44CALIBER-main\44CALIBER-main\44CALIBER\obj\Release\Insidious.pdb source: 123.scr.exe |
Source: | Binary string: System.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp |
Source: cert9.db.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: cert9.db.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: cert9.db.0.dr | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: cert9.db.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: cert9.db.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: cert9.db.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: cert9.db.0.dr | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B2D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://freegeoip.app |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B8F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ipbase.com |
Source: cert9.db.0.dr | String found in binary or memory: http://ocsp.digicert.com0 |
Source: cert9.db.0.dr | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: cert9.db.0.dr | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: cert9.db.0.dr | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125 |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4A91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.vimeworld.ru/user/name/ |
Source: 123.scr.exe | String found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/ |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&comm |
Source: tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: 123.scr.exe | String found in binary or memory: https://discordapp.com/api/webhooks/1184504729359896607/fPAMX9PDaXX6cd_-7EdUwUPRgvGLKrETMXz361gwk0y1 |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400 |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B29000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B15000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://freegeoip.app |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4A91000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://freegeoip.app/xml/ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B7A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipbase.com |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4B2D000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B7A000.00000004.00000800.00020000.00000000.sdmp, 123.scr.exe, 00000000.00000002.1664632120.00000281B4B76000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipbase.com/xml/ |
Source: 123.scr.exe | String found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://support.mozilla.org |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C5032000.00000004.00000800.00020000.00000000.sdmp, tmpF847.tmp.dat.0.dr, tmpF7F6.tmp.dat.0.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C4B39000.00000004.00000800.00020000.00000000.sdmp, tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: 123.scr.exe, 00000000.00000002.1667103799.00000281C4B39000.00000004.00000800.00020000.00000000.sdmp, tmpF797.tmp.tmpdb.0.dr | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: 123.scr.exe, type: SAMPLE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 123.scr.exe, type: SAMPLE | Matched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen |
Source: 123.scr.exe, type: SAMPLE | Matched rule: Detects A310Logger Author: ditekSHen |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: Detects A310Logger Author: ditekSHen |
Source: 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B8A48C6 | 0_2_00007FFD9B8A48C6 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B8A5672 | 0_2_00007FFD9B8A5672 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B8913F0 | 0_2_00007FFD9B8913F0 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B8913F3 | 0_2_00007FFD9B8913F3 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891410 | 0_2_00007FFD9B891410 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891428 | 0_2_00007FFD9B891428 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891458 | 0_2_00007FFD9B891458 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891440 | 0_2_00007FFD9B891440 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B893EA0 | 0_2_00007FFD9B893EA0 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891470 | 0_2_00007FFD9B891470 |
Source: C:\Users\user\Desktop\123.scr.exe | Code function: 0_2_00007FFD9B891490 | 0_2_00007FFD9B891490 |
Source: 123.scr.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 123.scr.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers |
Source: 123.scr.exe, type: SAMPLE | Matched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207 |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers |
Source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207 |
Source: 00000000.00000002.1664632120.00000281B4B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: tmpF836.tmp.dat.0.dr | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: | Binary string: system.windows.forms.dll.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Windows.Forms.pdb source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4AE1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbL- source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\nazar\Desktop\44CALIBER-main\44CALIBER-main\44CALIBER\obj\Release\Insidious.pdb source: 123.scr.exe |
Source: | Binary string: System.pdb source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4BF1000.00000004.00000800.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599672 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599563 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599453 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599344 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599235 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599110 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598985 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598860 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598747 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598625 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598516 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -6456360425798339s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -600000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599563s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599344s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599235s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -599110s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -598985s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -598860s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -598747s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -598625s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6808 | Thread sleep time: -598516s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6720 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe TID: 6548 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 600000 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599890 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599781 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599672 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599563 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599453 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599344 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599235 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 599110 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598985 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598860 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598747 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598625 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 598516 | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: 123.scr.exe, 00000000.00000002.1668274384.00000281CDFB9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: 123.scr.exe, 00000000.00000002.1668016511.00000281CD1D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp |
Source: 123.scr.exe, 00000000.00000002.1667874669.00000281CD1CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareVL19LB_3Win32_VideoControllerYCH4L_T8VideoController120060621000000.000000-0005881.3..display.infMSBDATCXN27U3PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemuser-PC1280 x 1024 x 4294967296 colorsX1LUG7B1: |
Source: 123.scr.exe, 00000000.00000002.1668274384.00000281CDFB9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Win32_VideoController(Standard display types)VMwareVL19LB_3Win32_VideoControllerYCH4L_T8VideoController120060621000000.000000-0005881.3..display.infMSBDATCXN27U3PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemuser-PC1280 x 1024 x 4294967296 colorsX1LUG7B1LMEM` |
Source: Yara match | File source: 123.scr.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Wallets\Electrum\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: C\Wallets\Jaxx\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Wallets\Exodus\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Wallets\Ethereum\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Wallets\Exodus\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Wallets\Ethereum\ |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Exodus\exodus.wallet\hB |
Source: 123.scr.exe, 00000000.00000002.1664632120.00000281B4C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: \Ethereum\keystoreh |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\123.scr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: Yara match | File source: 123.scr.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR |
Source: Yara match | File source: 123.scr.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.123.scr.exe.281b2d90000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1664632120.00000281B4ABD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1632100447.00000281B2D92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 123.scr.exe PID: 6476, type: MEMORYSTR |