Click to jump to signature section
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | ReversingLabs: Detection: 13% |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Virustotal: Detection: 29% | Perma Link |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Joe Sandbox View | IP Address: 34.117.186.192 34.117.186.192 |
Source: Joe Sandbox View | IP Address: 34.117.186.192 34.117.186.192 |
Source: unknown | DNS query: name: ipinfo.io |
Source: unknown | DNS query: name: ipinfo.io |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioUser-Agent: Go-http-client/1.1Accept-Encoding: gzip |
Source: unknown | DNS traffic detected: queries for: ipinfo.io |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61A2F1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://invalidkey4.dblookup |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.ioHTTP/1.1HTTP/1.1I |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.ioHTTP/1.1HTTP/1.1Ihttp/1.1http/1.1yipinfo.io:80HTTP_PROXYhttp_proYhttp_proxyhttp_prox |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00016E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missingauth |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missingauthreflect.Value.SetMapIndex |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://t.me/PSoftware |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.dr | String found in binary or memory: https://t.me/Planet_Stealer |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: classification engine | Classification label: mal52.spyw.winEXE@6/10@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6364:120:WilError_03 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File created: C:\Users\user\AppData\Local\Temp\system.txt | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Windows\system32\33d169ff311846526eb1290a1192115a6eb4dfb8b4315ebf59fa197f0d23311bAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727066764.00000195CB327000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727169115.00000195CB32C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734540213.00000195CB32F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT a11,a102 FROM nssPrivate; |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727066764.00000195CB327000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727169115.00000195CB32C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734540213.00000195CB32F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SELECT a11,a102 FROM nssPrivate;. |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000168000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;PRAGMA locking_mode = %s;PRAGMA locking_mode = NORMAL;PRAGMA synchronous = NORMAL;C:\Users\userC:\Users\user\intentlauncher\launcherconfigC:\Users\user\.lunarclient\settings\game\accounts.jsonC:\Users\user\AppData\Roaming\.minecraft\TlauncherProfiles.jsonC:\Users\user\AppData\Roaming\.feather\accounts.jsonC:\Users\user\AppData\Roaming\.minecraft\meteor-client\C:\Users\user\AppData\Roaming\.minecraft\Impact\alts.jsonC:\Users\user\AppData\Roaming\.minecraft\Novoline\alts.novoC:\Users\user\AppData\Roaming\.minecraft\launcher_accounts_microsoft_store.jsonC:\Users\user\AppData\Roaming\.minecraft\C:\Users\user\AppData\Roaming\.minecraft\Rise\alts.txtC:\Users\user\intentlauncher\Rise\alts.txtC:\Users\user\AppData\Roaming\paladium-group\accounts.jsonC:\Users\user\AppData\Roaming\PolyMC\accounts.jsonC:\Users\user\AppData\Roaming\Badlion Client\accounts.jsonC:\Users\user\AppData\Local\Temp\exodus-passwords.txtC:\Users\user\AppData\Local\Temp\discord-tokens.txtkernel32.dll |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx)); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check'); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C000240000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cardsfqs92o4p.default-releasePRAGMA synchronous = NORMAL;;pData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000168000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000; |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C00020C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SELECT item1, item2 FROM metadatPRAGMA busy_timeout = 5000; |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C00033B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1723561993.00000195CB335000.00000004.00000020.00020000.00000000.sdmp, qEyjW2Mb.dat.0.dr | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode); |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C00020C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SELECT a11,a102 FROM nssPrivate;SELECT a11,a102 FROM nssPrivate; |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | ReversingLabs: Detection: 13% |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Virustotal: Detection: 29% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 | Jump to behavior |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Static file information: File size 4371968 > 1048576 |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Static PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x42ae00 |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Code function: 0_3_00000195CAFE9398 pushad ; retf | 0_3_00000195CAFE9399 |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtrayvboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00007E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtraywmiprvse.exe |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtraysgrmbroker.exe |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: winstore.app.exevmtoolsdy |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxserviceh |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: registryvmtoolsdregistryregistryvm3dservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: [system process]vboxtrayvboxtray[system process]vboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtraysearchapp.exe |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdy |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtraysystem |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtrayregistryvboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00007E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtrayjkbaorwnsqh.exe |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: [system process]vmtoolsdy |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OpenProcessFormatMessageWGetProcessTimesCloseHandleProcess32FirstWProcess32NextWSystemvmtoolsdsystemvm3dservicesystemyvboxtrayvboxtraysystemvboxserviceRegistryregistryvmtoolsdregistryregistryvm3dserviceyvboxtrayvboxtrayregistryvboxservicewininit.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicecsrss.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicewinlogon.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicelsass.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicedwm.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdsystem |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: winstore.app.exevboxtrayvboxtraywinstore.app.exevboxservice |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayvboxtraydashost.exe |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: jkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicehRegOpenKeyExWMachineGuidRegCloseKeyNoDefaul.\wmicNoDefaultCurrentwmicwmicwmic.comwmic.exeCreateFileWCreateFileCreateFilewmic.batwmic.cmdCreateFileCreateFilewmic.vbswmic.vbeCreateFileCreateFilewmic.jswmic.jseCreateFileCreateFilewmic.wsfwmic.wshCreateFileCreateFilewmic.mscusernameCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileNULCreatePipe=::=::\HOMEDRIVE=C:OS=Windows_NTuserprofileuserdomaintmptempsystemrootsystemdrivesessionnamepublicpathextpsmodulepathprogramw6432programfilesprogramdataprocessor_levelpathosonedrivelogonserverlocalappdatahomepathcomspechomedrivedriverdatacomputernameappdatawmic cpuallusersprofileSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTwmic cpu get DuplicateHandleCreateProcessWCancelIoEx |
Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1733572042.00000195A3A33000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\qEyjW2Mb.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\nPKJDroJ.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\OnvHR2w6.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\pROEk56G.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Queries volume information: C:\Users\user\AppData\Local\Temp\NCqkjQXI.dat VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Bookmarks | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: Yara match | File source: 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe PID: 6348, type: MEMORYSTR |