Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: pointer.com, 00000008.00000002.1707541930.0000000002D7A000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695608530.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695215614.0000000012A71000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1706456681.0000000002C10000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2905399025.0000000034B5E000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2903919561.0000000031E8A000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000002.1906314085.0000000002C5C000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1936537940.0000000025FDA000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif.8.dr | String found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: certutil.exe, 00000003.00000003.1637088713.000002599966D000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000000.1646787400.0000000000451000.00000008.00000001.01000000.00000004.sdmp, pointer.com, 00000008.00000002.1702806735.0000000002890000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1691476533.000000007EB40000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1690060768.00000000122F3000.00000004.00000020.00020000.00000000.sdmp, pointer.com.3.dr, Kyvoykbd.PIF.8.dr | String found in binary or memory: http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/ |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: pointer.com, 00000008.00000002.1707541930.0000000002D7A000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695608530.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695215614.0000000012A71000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1706456681.0000000002C10000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2905399025.0000000034B5E000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2903919561.0000000031E8A000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000002.1907480971.0000000002EE9000.00000004.00001000.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000002.1906314085.0000000002C5C000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1936537940.0000000025FDA000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif.8.dr | String found in binary or memory: http://ocsp.comodoca.com0$ |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: http://ocsp.sectigo.com0C |
Source: pointer.com, 00000008.00000002.1707541930.0000000002D7A000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695608530.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725427187.0000000012B1B000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1695215614.0000000012A71000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1706456681.0000000002C10000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2905399025.0000000034B5E000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2903919561.0000000031E8A000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000002.1907480971.0000000002EE9000.00000004.00001000.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000002.1906314085.0000000002C5C000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1936537940.0000000025FDA000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif.8.dr | String found in binary or memory: http://www.pmail.com0 |
Source: pointer.com, 00000008.00000002.1699425872.000000000076F000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000003.1903375914.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/ |
Source: Kyvoykbd.PIF, 00000017.00000003.1835151143.00000000007D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/p |
Source: Kyvoykbd.PIF, 00000017.00000003.1835151143.00000000007D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/y4m6qczzBL-6Qgtp1_yGbwbc99ja1thGmpqx8uKxVY_xbxl3fkf2m3OFPmzYatw08dZ |
Source: pointer.com, 00000008.00000002.1700601640.00000000007C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/y4mAdmSw0kHlKdlZ_ |
Source: Kyvoykbd.PIF, 0000001A.00000003.1903375914.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/y4mAdmSw0kHlKdlZ_V9zK5Rp4Inwn0d8s0sA90wD5LhatoPDxN7O8W4csICtjQFNHdL |
Source: Kyvoykbd.PIF, 0000001A.00000003.1903375914.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/y4mUAP1ymrBd-yTUK-CEq_HTtBVr8tWG7SWIhrccYhDE7W1JTuqN9h-qN3t2eBC5jBZ |
Source: pointer.com, 00000008.00000002.1699425872.000000000076F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com/y4mfBiglz8YyU9V3b3twgGQe0LQySDhgpDCtOzTrQ45ntYAryOp4shjIaZZfsmf7IW7 |
Source: Kyvoykbd.PIF, 00000017.00000002.1836525497.0000000000819000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 00000017.00000003.1835151143.00000000007D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com:443/y4m6qczzBL-6Qgtp1_yGbwbc99ja1thGmpqx8uKxVY_xbxl3fkf2m3OFPmzYatw |
Source: Kyvoykbd.PIF, 0000001A.00000002.1904801201.0000000000767000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000003.1903375914.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com:443/y4mUAP1ymrBd-yTUK-CEq_HTtBVr8tWG7SWIhrccYhDE7W1JTuqN9h-qN3t2eBC |
Source: pointer.com, 00000008.00000002.1699425872.000000000076F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://8rxyhq.am.files.1drv.com:443/y4mfBiglz8YyU9V3b3twgGQe0LQySDhgpDCtOzTrQ45ntYAryOp4shjIaZZfsmf |
Source: dbkyovyK.pif | String found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper |
Source: pointer.com, 00000008.00000002.1723986250.00000000123C8000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1696692635.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.000000000041A000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000003.1719337894.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000003.1719205642.000000002FDE6000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000003.1719249332.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000003.1719205642.000000002FDEE000.00000004.00000020.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000003.1719410904.000000002FDE2000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 00000017.00000002.1846860261.00000000123A7000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC: |
Source: Kyvoykbd.PIF, 00000017.00000003.1835151143.00000000007D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://live.com/ |
Source: pointer.com, 00000008.00000002.1699425872.000000000076F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://live.com/BpR3C |
Source: Kyvoykbd.PIF, 0000001A.00000002.1904801201.0000000000767000.00000004.00000020.00020000.00000000.sdmp, Kyvoykbd.PIF, 0000001A.00000003.1903375914.0000000000726000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://live.com/on |
Source: pointer.com, 00000008.00000002.1699425872.00000000006EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://onedrive.live.com/ |
Source: Kyvoykbd.PIF, 00000017.00000003.1835151143.000000000076C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://onedrive.live.com/- |
Source: Kyvoykbd.PIF, 0000001A.00000003.1903375914.00000000006E4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://onedrive.live.com/download?resid=BF523B4A9B64BC6C%21135&authkey= |
Source: Kyvoykbd.PIF, 0000001A.00000003.1903375914.00000000006AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://onedrive.live.com/u |
Source: pointer.com, 00000008.00000003.1689587889.000000007EE90000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1721877253.0000000011390000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1725576300.000000007F0B0000.00000004.00001000.00020000.00000000.sdmp, pointer.com, 00000008.00000003.1693260679.0000000012434000.00000004.00000020.00020000.00000000.sdmp, pointer.com, 00000008.00000002.1723986250.0000000012303000.00000004.00001000.00020000.00000000.sdmp, dbkyovyK.pif, 0000000E.00000001.1696850208.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 00000019.00000001.1834966037.0000000000710000.00000040.00000001.00020000.00000000.sdmp, dbkyovyK.pif, 0000001D.00000002.1918637421.0000000000710000.00000040.00000400.00020000.00000000.sdmp, truesight.sys.8.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: PRODUCT.bat, type: SAMPLE | Matched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen |
Source: 8.2.pointer.com.12661d48.9.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 23.2.Kyvoykbd.PIF.123c4b88.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.2.pointer.com.123e5bb8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 0000000E.00000001.1696850208.000000000041A000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000017.00000002.1846860261.00000000123A7000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000008.00000002.1723986250.00000000123C8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000000E.00000003.1719337894.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000008.00000003.1696692635.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 0000000E.00000003.1719205642.000000002FDE6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects SystemBC Author: ditekSHen |
Source: 0000000E.00000003.1719249332.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000000E.00000003.1719410904.000000002FDE2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000000E.00000003.1719205642.000000002FDEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects SystemBC Author: ditekSHen |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: certcli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cryptui.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: certca.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\certutil.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\PING.EXE | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ?????.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: url.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??i.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ???.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??????s.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??l????.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??l??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??l??????.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ??.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: mssip32.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: smartscreenps.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: winhttpcom.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: C:\Users\Public\pointer.com | Section loaded: am.dll | Jump to behavior |
Source: PRODUCT.bat, type: SAMPLE | Matched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload |
Source: 8.2.pointer.com.12661d48.9.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fdf7880.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 14.3.dbkyovyK.pif.2fdf6010.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 14.3.dbkyovyK.pif.2fde2d40.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 29.1.dbkyovyK.pif.400000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fdf7880.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 8.2.pointer.com.126450d8.10.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 29.1.dbkyovyK.pif.400000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 25.1.dbkyovyK.pif.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 25.1.dbkyovyK.pif.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.2.pointer.com.123c8f48.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.2.pointer.com.126450d8.10.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fde45b0.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 23.2.Kyvoykbd.PIF.123c4b88.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 23.2.Kyvoykbd.PIF.123a7f18.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.2.pointer.com.123e5bb8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 29.2.dbkyovyK.pif.400000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 14.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 8.2.pointer.com.123c8f48.5.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 14.3.dbkyovyK.pif.2fdf7880.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 29.2.dbkyovyK.pif.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 00000019.00000001.1834966037.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 0000000E.00000001.1696850208.000000000041A000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000017.00000002.1846860261.00000000123A7000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000008.00000002.1723986250.00000000123C8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000000E.00000003.1719337894.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000008.00000003.1696692635.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 0000000E.00000002.2878947374.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 0000000E.00000003.1719205642.000000002FDE6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000008.00000002.1725155820.0000000012645000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 0000001D.00000002.1918637421.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: 0000000E.00000003.1719249332.000000002FDF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000000E.00000003.1719410904.000000002FDE2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000000E.00000003.1719205642.000000002FDEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object |
Source: 0000001D.00000001.1902763804.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_0041E172 mov eax, dword ptr fs:[00000030h] | 14_2_0041E172 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_004143ED mov eax, dword ptr fs:[00000030h] | 14_2_004143ED |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_004143F4 mov eax, dword ptr fs:[00000030h] | 14_2_004143F4 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_0041471F mov eax, dword ptr fs:[00000030h] | 14_2_0041471F |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B9B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B9B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B9B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B9B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B9B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B9B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B9B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B9B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B93C mov eax, dword ptr fs:[00000030h] | 14_2_39D3B93C |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BADF mov eax, dword ptr fs:[00000030h] | 14_2_39D3BADF |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BADF mov eax, dword ptr fs:[00000030h] | 14_2_39D3BADF |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3DACB mov ecx, dword ptr fs:[00000030h] | 14_2_39D3DACB |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3DACB mov ecx, dword ptr fs:[00000030h] | 14_2_39D3DACB |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3DACB mov ecx, dword ptr fs:[00000030h] | 14_2_39D3DACB |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3DC2D mov ecx, dword ptr fs:[00000030h] | 14_2_39D3DC2D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3DC2D mov ecx, dword ptr fs:[00000030h] | 14_2_39D3DC2D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BFBA mov eax, dword ptr fs:[00000030h] | 14_2_39D3BFBA |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BFBA mov ecx, dword ptr fs:[00000030h] | 14_2_39D3BFBA |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BEB3 mov eax, dword ptr fs:[00000030h] | 14_2_39D3BEB3 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3BEB3 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3BEB3 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3FE00 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3FE00 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3FE00 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3FE00 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CE3130 mov ecx, dword ptr fs:[00000030h] | 14_2_39CE3130 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CE3130 mov ecx, dword ptr fs:[00000030h] | 14_2_39CE3130 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B3D9 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B3D9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B3D9 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3B3D9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED3C2 mov eax, dword ptr fs:[00000030h] | 14_2_39CED3C2 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3D395 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3D395 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3D395 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3D395 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B350 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B350 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B350 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3B350 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B2D1 mov eax, dword ptr fs:[00000030h] | 14_2_39D3B2D1 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B2D1 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3B2D1 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D13260 mov ecx, dword ptr fs:[00000030h] | 14_2_39D13260 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D13260 mov ecx, dword ptr fs:[00000030h] | 14_2_39D13260 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D135C0 mov eax, dword ptr fs:[00000030h] | 14_2_39D135C0 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED554 mov eax, dword ptr fs:[00000030h] | 14_2_39CED554 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED41E mov eax, dword ptr fs:[00000030h] | 14_2_39CED41E |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B71F mov eax, dword ptr fs:[00000030h] | 14_2_39D3B71F |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3B71F mov eax, dword ptr fs:[00000030h] | 14_2_39D3B71F |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED690 mov eax, dword ptr fs:[00000030h] | 14_2_39CED690 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CED690 mov eax, dword ptr fs:[00000030h] | 14_2_39CED690 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3F650 mov eax, dword ptr fs:[00000030h] | 14_2_39D3F650 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov eax, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov ecx, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov ecx, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39CEC9B9 mov ecx, dword ptr fs:[00000030h] | 14_2_39CEC9B9 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D28BF0 mov ecx, dword ptr fs:[00000030h] | 14_2_39D28BF0 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D28BF0 mov ecx, dword ptr fs:[00000030h] | 14_2_39D28BF0 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3EB3B mov ecx, dword ptr fs:[00000030h] | 14_2_39D3EB3B |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CA10 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CA10 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CA10 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CA10 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CA10 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CA10 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CA10 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3CA10 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D24D30 mov eax, dword ptr fs:[00000030h] | 14_2_39D24D30 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CCC6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CCC6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CCC6 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3CCC6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CC01 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CC01 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CC01 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3CC01 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CE14 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CE14 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3CE14 mov eax, dword ptr fs:[00000030h] | 14_2_39D3CE14 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D30146 mov eax, dword ptr fs:[00000030h] | 14_2_39D30146 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C106 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C106 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C106 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C106 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3E0DD mov edx, dword ptr fs:[00000030h] | 14_2_39D3E0DD |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3E0DD mov ecx, dword ptr fs:[00000030h] | 14_2_39D3E0DD |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3E058 mov edx, dword ptr fs:[00000030h] | 14_2_39D3E058 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C383 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C383 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C383 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3C383 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D403AB mov ecx, dword ptr fs:[00000030h] | 14_2_39D403AB |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D403AB mov ecx, dword ptr fs:[00000030h] | 14_2_39D403AB |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C304 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C304 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C304 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3C304 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C290 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C290 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3E2A6 mov ecx, dword ptr fs:[00000030h] | 14_2_39D3E2A6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3E556 mov eax, dword ptr fs:[00000030h] | 14_2_39D3E556 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C526 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C526 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C526 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C526 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C40C mov eax, dword ptr fs:[00000030h] | 14_2_39D3C40C |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C40C mov ecx, dword ptr fs:[00000030h] | 14_2_39D3C40C |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C7B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C7B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C7B6 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C7B6 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C68D mov eax, dword ptr fs:[00000030h] | 14_2_39D3C68D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C68D mov eax, dword ptr fs:[00000030h] | 14_2_39D3C68D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C68D mov eax, dword ptr fs:[00000030h] | 14_2_39D3C68D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C68D mov eax, dword ptr fs:[00000030h] | 14_2_39D3C68D |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 14_2_39D3C610 mov eax, dword ptr fs:[00000030h] | 14_2_39D3C610 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 25_1_0041E172 mov eax, dword ptr fs:[00000030h] | 25_1_0041E172 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 25_1_004143ED mov eax, dword ptr fs:[00000030h] | 25_1_004143ED |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 25_1_004143F4 mov eax, dword ptr fs:[00000030h] | 25_1_004143F4 |
Source: C:\Users\Public\Libraries\dbkyovyK.pif | Code function: 25_1_0041471F mov eax, dword ptr fs:[00000030h] | 25_1_0041471F |