Source: http://goodfooggooftool.net/index.php | Avira URL Cloud: Label: malware |
Source: http://valarioulinity1.net/index.php | Avira URL Cloud: Label: malware |
Source: http://cassiosssionunu.me/index.php | Avira URL Cloud: Label: malware |
Source: http://vacantion18ffeu.cc/index.php | Avira URL Cloud: Label: malware |
Source: http://selebration17io.io/index.php | Avira URL Cloud: Label: phishing |
Source: http://sulugilioiu19.net/index.php | Avira URL Cloud: Label: malware |
Source: http://buriatiarutuhuob.net/index.php | Avira URL Cloud: Label: malware |
Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp | Malware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://goodfooggooftool.net/index.php", "http://sulugilioiu19.net/index.php", "http://selebration17io.io/index.php", "http://vacantion18ffeu.cc/index.php", "http://valarioulinity1.net/index.php", "http://buriatiarutuhuob.net/index.php", "http://cassiosssionunu.me/index.php"]} |
Source: selebration17io.io | Virustotal: Detection: 16% | Perma Link |
Source: http://goodfooggooftool.net/index.php | Virustotal: Detection: 15% | Perma Link |
Source: http://valarioulinity1.net/index.php | Virustotal: Detection: 14% | Perma Link |
Source: http://selebration17io.io/index.php | Virustotal: Detection: 14% | Perma Link |
Source: http://cassiosssionunu.me/index.php | Virustotal: Detection: 13% | Perma Link |
Source: http://buriatiarutuhuob.net/index.php | Virustotal: Detection: 15% | Perma Link |
Source: http://vacantion18ffeu.cc/index.php | Virustotal: Detection: 21% | Perma Link |
Source: http://sulugilioiu19.net/index.php | Virustotal: Detection: 13% | Perma Link |
Source: Malware configuration extractor | URLs: http://goodfooggooftool.net/index.php |
Source: Malware configuration extractor | URLs: http://sulugilioiu19.net/index.php |
Source: Malware configuration extractor | URLs: http://selebration17io.io/index.php |
Source: Malware configuration extractor | URLs: http://vacantion18ffeu.cc/index.php |
Source: Malware configuration extractor | URLs: http://valarioulinity1.net/index.php |
Source: Malware configuration extractor | URLs: http://buriatiarutuhuob.net/index.php |
Source: Malware configuration extractor | URLs: http://cassiosssionunu.me/index.php |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: explorer.exe, 00000002.00000000.2075690937.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.v |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: explorer.exe, 00000002.00000000.2077924540.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078364506.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078340556.0000000008870000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: explorer.exe, 00000002.00000002.3268274578.00000000011A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://selebration17io.io/index.php |
Source: explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://smiodprqlvtv.net/ |
Source: explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://smiodprqlvtv.net/application/x-www-form-urlencodedMozilla/5.0 |
Source: explorer.exe, 00000002.00000002.3275682540.000000000C81C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081841615.000000000C81C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: explorer.exe, 00000002.00000003.3095522768.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094758629.000000000C514000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3275303144.000000000C518000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe |
Source: explorer.exe, 00000002.00000003.3095264105.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3270338419.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://android.notify.windows.com/iOS |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/ |
Source: explorer.exe, 00000002.00000002.3270338419.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2077257852.0000000007637000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: explorer.exe, 00000002.00000003.3094228937.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2076341879.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3269123884.00000000035FA000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://arc.msn.coml |
Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.com |
Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009D42000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.com |
Source: explorer.exe, 00000002.00000002.3275032244.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C460000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comcember |
Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/)s |
Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.comon |
Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown |
Source: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown |
Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401553 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00403005 RtlCreateUserThread,NtTerminateProcess, | 0_2_00403005 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401561 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401561 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_0040156B |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_0040156F NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_0040156F |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401729 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401729 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_004023E5 NtQuerySystemInformation, | 0_2_004023E5 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401583 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401587 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401587 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_004026A0 NtEnumerateKey, | 0_2_004026A0 |
Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Section loaded: msimg32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Section loaded: msvcr100.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: windows.cloudstore.schema.shell.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00403253 push eax; ret | 0_2_0040332D |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00401C64 push es; retf | 0_2_00401C83 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00403335 push eax; ret | 0_2_0040332D |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_00402F91 push 60B44389h; retf | 0_2_00402FAB |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_004F1CCB push es; retf | 0_2_004F1CEA |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Code function: 0_2_004F2FF8 push 60B44389h; retf | 0_2_004F3012 |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: C:\Users\user\Desktop\br0A8E2X6I.exe | Key enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI | Jump to behavior |
Source: explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}, |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW0r |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTcaVMWare |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009B41000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000% |
Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware, Inc. |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware SATA CD00 |
Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware-42 27 d9 2e dc 89 72 dX |
Source: explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A |
Source: explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^ |
Source: explorer.exe, 00000002.00000002.3272482280.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX |
Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: VMware,p |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_ |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5- |
Source: explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: explorer.exe, 00000002.00000003.3096144958.0000000009B41000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000003.3095264105.000000000769A000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Shell_TrayWnd= |
Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Program Manager |
Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2077053592.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progman |
Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progmanlock |
Source: explorer.exe, 00000002.00000002.3268026747.0000000000EF0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2075690937.0000000000EF8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PProgman |