Source: http://lousta.net/F. | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/92/650.htmlx; | Avira URL Cloud: Label: malware |
Source: http://lousta.net/242/343.html | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.htmlr-b | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/ | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/92/650.html | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/S | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/T | Avira URL Cloud: Label: malware |
Source: http://lousta.net/650/534.html | Avira URL Cloud: Label: malware |
Source: http://lousta.net/ | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.htmlE | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/569/916.html9 | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3L | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.html$ | Avira URL Cloud: Label: malware |
Source: http://lousta.net/7/91.html | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.html | Avira URL Cloud: Label: malware |
Source: http://lousta.net/876/244.html | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.html7 | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/lousta.net | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.html | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/569/916.html | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/92/650.htmlws | Avira URL Cloud: Label: malware |
Source: http://lousta.net/7/91.htmla | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.htmlZ | Avira URL Cloud: Label: malware |
Source: http://lousta.net/650/534.htmlr | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.htmlg | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/ | Avira URL Cloud: Label: malware |
Source: http://lousta.net/0 | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/470/855.html | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.htmlhtml | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEM | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.html_-O | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/92/650.htmll; | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.htmlm | Avira URL Cloud: Label: malware |
Source: http://ow5dirasuek.com/580/608.htmlk | Avira URL Cloud: Label: malware |
Source: http://lousta.net/763/735.htmlH | Avira URL Cloud: Label: malware |
Source: http://mkkuei4kdsz.com/569/916.html# | Avira URL Cloud: Label: malware |
Source: lousta.net | Virustotal: Detection: 12% | Perma Link |
Source: mkkuei4kdsz.com | Virustotal: Detection: 12% | Perma Link |
Source: ow5dirasuek.com | Virustotal: Detection: 8% | Perma Link |
Source: http://mkkuei4kdsz.com/ | Virustotal: Detection: 12% | Perma Link |
Source: http://ow5dirasuek.com/S | Virustotal: Detection: 8% | Perma Link |
Source: http://lousta.net/ | Virustotal: Detection: 12% | Perma Link |
Source: http://ow5dirasuek.com/T | Virustotal: Detection: 6% | Perma Link |
Source: http://lousta.net/650/534.html | Virustotal: Detection: 7% | Perma Link |
Source: http://ow5dirasuek.com/92/650.html | Virustotal: Detection: 10% | Perma Link |
Source: http://ow5dirasuek.com/580/608.html | Virustotal: Detection: 8% | Perma Link |
Source: http://ow5dirasuek.com/lousta.net | Virustotal: Detection: 7% | Perma Link |
Source: http://lousta.net/876/244.html | Virustotal: Detection: 14% | Perma Link |
Source: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon | Virustotal: Detection: 6% | Perma Link |
Source: http://lousta.net/763/735.html | Virustotal: Detection: 8% | Perma Link |
Source: http://lousta.net/0 | Virustotal: Detection: 14% | Perma Link |
Source: http://mkkuei4kdsz.com/470/855.html | Virustotal: Detection: 13% | Perma Link |
Source: http://ow5dirasuek.com/ | Virustotal: Detection: 8% | Perma Link |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040ABD9 FindFirstFileW,FindClose, | 0_2_0040ABD9 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose, | 0_2_00408248 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040ABD9 FindFirstFileW,FindClose, | 13_2_0040ABD9 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose, | 13_2_00408248 |
Source: global traffic | HTTP traffic detected: GET /650/534.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: lousta.netConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /470/855.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: mkkuei4kdsz.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /92/650.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: ow5dirasuek.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /569/916.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: mkkuei4kdsz.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /650/534.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: lousta.netConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /470/855.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: mkkuei4kdsz.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /92/650.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: ow5dirasuek.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /569/916.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: mkkuei4kdsz.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: global traffic | HTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0 |
Source: omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/0 |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/242/343.html |
Source: omsecor.exe, 00000002.00000002.1665837738.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/650/534.html |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/650/534.htmlr |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/7/91.html |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/7/91.htmla |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.html |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.html$ |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.htmlH |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.htmlZ |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.html_-O |
Source: omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.htmlhtml |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/763/735.htmlr-b |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/876/244.html |
Source: omsecor.exe, 00000002.00000003.1646596868.000000000083E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://lousta.net/F. |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/ |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3L |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/470/855.html |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEM |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/569/916.html |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/569/916.html# |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://mkkuei4kdsz.com/569/916.html9 |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/ |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.html |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.html7 |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.htmlE |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.htmlg |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.htmlk |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/580/608.htmlm |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/92/650.html |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/92/650.htmll; |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/92/650.htmlws |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/92/650.htmlx; |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/S |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/T |
Source: h.exe, omsecor.exe.0.dr, omsecor.exe.2.dr | String found in binary or memory: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon |
Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ow5dirasuek.com/lousta.net |
Source: omsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://domaincntrol.com/?orighost= |
Source: omsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://nojs.domaincntrol.com |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_00401C41 | 0_2_00401C41 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040D2A4 | 0_2_0040D2A4 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040B51C | 0_2_0040B51C |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040CBD0 | 0_2_0040CBD0 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_00401C41 | 13_2_00401C41 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040D2A4 | 13_2_0040D2A4 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040B51C | 13_2_0040B51C |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040CBD0 | 13_2_0040CBD0 |
Source: unknown | Process created: C:\Users\user\Desktop\h.exe C:\Users\user\Desktop\h.exe | |
Source: C:\Users\user\Desktop\h.exe | Process created: C:\Users\user\AppData\Roaming\omsecor.exe C:\Users\user\AppData\Roaming\omsecor.exe | |
Source: C:\Users\user\AppData\Roaming\omsecor.exe | Process created: C:\Windows\SysWOW64\omsecor.exe C:\Windows\System32\omsecor.exe | |
Source: C:\Users\user\Desktop\h.exe | Process created: C:\Users\user\AppData\Roaming\omsecor.exe C:\Users\user\AppData\Roaming\omsecor.exe | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\omsecor.exe | Process created: C:\Windows\SysWOW64\omsecor.exe C:\Windows\System32\omsecor.exe | Jump to behavior |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040350F HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileStringW,GetPrivateProfileStringW, | 0_2_0040350F |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_004039EA HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,StrStrIW,StrStrIW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW, | 0_2_004039EA |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040350F HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileStringW,GetPrivateProfileStringW, | 13_2_0040350F |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_004039EA HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,StrStrIW,StrStrIW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW, | 13_2_004039EA |
Source: C:\Windows\SysWOW64\omsecor.exe | Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess | graph_13-5734 |
Source: C:\Users\user\Desktop\h.exe | Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess | graph_0-5784 |
Source: C:\Windows\SysWOW64\omsecor.exe | Evasive API call chain: GetModuleFileName,DecisionNodes,Sleep | graph_13-5861 |
Source: C:\Users\user\Desktop\h.exe | Evasive API call chain: GetModuleFileName,DecisionNodes,Sleep | graph_0-5861 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040ABD9 FindFirstFileW,FindClose, | 0_2_0040ABD9 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose, | 0_2_00408248 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040ABD9 FindFirstFileW,FindClose, | 13_2_0040ABD9 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose, | 13_2_00408248 |
Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp5a%SystemRoot%\system32\mswsock.dllE |
Source: omsecor.exe, 00000002.00000002.1665837738.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000085A000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000003.1646596868.000000000085A000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW* |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_004075D4 GetLastError,CreateFileW,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,RtlAllocateHeap,ReadFile,ReadFile,WriteFile,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,WriteFile,CloseHandle,FindCloseChangeNotification,CloseHandle, | 0_2_004075D4 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_004032B8 |
Source: C:\Users\user\Desktop\h.exe | Code function: 0_2_0040CD66 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_0040CD66 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 13_2_004032B8 |
Source: C:\Windows\SysWOW64\omsecor.exe | Code function: 13_2_0040CD66 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 13_2_0040CD66 |