Click to jump to signature section
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: unknown | TCP traffic detected without corresponding DNS query: 82.9.14.4 |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Code function: 0_2_014F0B12 | 0_2_014F0B12 |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Code function: 2_2_00FF2CC8 | 2_2_00FF2CC8 |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Code function: 2_2_00FF0B15 | 2_2_00FF0B15 |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Code function: 5_2_02600B12 | 5_2_02600B12 |
Source: Y0uLilkjPz.exe, 00000000.00000002.1375788013.000000000114E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe, 00000000.00000000.1371795673.0000000000B1E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameXeno_manager.exe: vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe, 00000000.00000002.1375788013.00000000011EA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameXeno vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe, 00000000.00000002.1375788013.00000000011EA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameXeno_manager.exe: vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe, 00000002.00000002.2614837795.000000000101E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe | Binary or memory string: OriginalFilenameXeno_manager.exe: vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe.0.dr | Binary or memory string: OriginalFilenameXeno_manager.exe: vs Y0uLilkjPz.exe |
Source: Y0uLilkjPz.exe, Encryption.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: Y0uLilkjPz.exe.0.dr, Encryption.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03 |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Mutant created: \Sessions\1\BaseNamedObjects\Xeno_rat_nd8912d-admin |
Source: unknown | Process created: C:\Users\user\Desktop\Y0uLilkjPz.exe "C:\Users\user\Desktop\Y0uLilkjPz.exe" | |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process created: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe "C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe" | |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "windows" /XML "C:\Users\user\AppData\Local\Temp\tmp99AA.tmp" /F | |
Source: C:\Windows\SysWOW64\schtasks.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process created: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe "C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /Create /TN "windows" /XML "C:\Users\user\AppData\Local\Temp\tmp99AA.tmp" /F | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: Y0uLilkjPz.exe, DllHandler.cs | .Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[]) |
Source: Y0uLilkjPz.exe, DllHandler.cs | .Net Code: DllNodeHandler |
Source: Y0uLilkjPz.exe.0.dr, DllHandler.cs | .Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[]) |
Source: Y0uLilkjPz.exe.0.dr, DllHandler.cs | .Net Code: DllNodeHandler |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Memory allocated: 14B0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Memory allocated: 2F60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe | Memory allocated: 2CF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: FF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: 2F50000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: 14C0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: 2600000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: 2900000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe | Memory allocated: 2740000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Y0uLilkjPz.exe TID: 7684 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe TID: 7792 | Thread sleep count: 31 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe TID: 7792 | Thread sleep time: -28592453314249787s >= -30000s | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe TID: 7836 | Thread sleep count: 1874 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe TID: 7836 | Thread sleep count: 7958 > 30 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe TID: 7920 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: Yara match | File source: Y0uLilkjPz.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.Y0uLilkjPz.exe.b10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1371780059.0000000000B12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: Y0uLilkjPz.exe PID: 7664, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe, type: DROPPED |
Source: Yara match | File source: Y0uLilkjPz.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.Y0uLilkjPz.exe.b10000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1371780059.0000000000B12000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: Y0uLilkjPz.exe PID: 7664, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\XenoManager\Y0uLilkjPz.exe, type: DROPPED |