Source: explorer.exe, 00000002.00000002.3452125149.000000000C385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2979437025.000000000C385000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://aeuothcasbr.com/ |
Source: explorer.exe, 00000002.00000002.3452125149.000000000C385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2979437025.000000000C385000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://aeuothcasbr.com/application/x-www-form-urlencodedMozilla/5.0 |
Source: explorer.exe, 00000002.00000002.3448807647.00000000099AB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://atahmsiplorwquuw.net/ |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000978C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000978C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000978C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000978C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: explorer.exe, 00000002.00000000.2254640839.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000962B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: explorer.exe, 00000002.00000000.2251732709.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3446354300.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3446333236.0000000007B50000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: explorer.exe, 00000002.00000002.3452125149.000000000C385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2979437025.000000000C385000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://selebration17io.io/ |
Source: explorer.exe, 00000002.00000002.3452963465.0000000010760000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3452941150.0000000010620000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://selebration17io.io/index.php |
Source: explorer.exe, 00000002.00000000.2255032281.00000000099AB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp |
Source: explorer.exe, 00000002.00000002.3451360110.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2256911237.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://android.notify.windows.com/iOS |
Source: explorer.exe, 00000002.00000000.2254640839.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000962B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/ |
Source: explorer.exe, 00000002.00000000.2254640839.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000962B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/I |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: explorer.exe, 00000002.00000000.2254640839.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000962B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows? |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows? |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://arc.msn.com |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark |
Source: explorer.exe, 00000002.00000003.2979925369.000000000C08A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3451553162.000000000C08B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2256911237.000000000C048000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.com- |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img |
Source: explorer.exe, 00000002.00000003.2979925369.000000000C08A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3451553162.000000000C08B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2256911237.000000000C048000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.come |
Source: explorer.exe, 00000002.00000000.2256911237.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3451360110.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comEMd |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000002.00000002.3448807647.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2255032281.00000000099AB000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/e |
Source: explorer.exe, 00000002.00000003.2979925369.000000000C08A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3451553162.000000000C08B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2256911237.000000000C048000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.comM |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar- |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its- |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized- |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of- |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve |
Source: explorer.exe, 00000002.00000000.2252804961.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com:443/en-us/feed |
Source: 00000006.00000002.2485910630.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000006.00000002.2485885145.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown |
Source: 00000000.00000002.2270182856.0000000002D02000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown |
Source: 00000000.00000002.2269300413.0000000002BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown |
Source: 00000006.00000002.2486160796.0000000002EC3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown |
Source: 00000006.00000002.2485978515.0000000002CB1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000000.00000002.2269955686.0000000002CD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000002.00000002.3447329337.0000000008751000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000000.00000002.2269686012.0000000002BC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: 00000002.00000002.3444065573.0000000002F21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown |
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTR | Matched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401553 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00403005 RtlCreateUserThread,NtTerminateProcess, | 0_2_00403005 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00401561 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401561 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_0040156B |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_0040156F NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_0040156F |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00401729 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,EntryPoint, | 0_2_00401729 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_004023E5 NtQuerySystemInformation, | 0_2_004023E5 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401583 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_00401587 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 0_2_00401587 |
Source: C:\Users\user\Desktop\vwaoMjcyAw.exe | Code function: 0_2_004026A0 NtEnumerateKey, | 0_2_004026A0 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_00401553 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00403005 RtlCreateUserThread,NtTerminateProcess, | 6_2_00403005 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00401561 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_00401561 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_0040156B |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_0040156F NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_0040156F |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00401729 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,EntryPoint, | 6_2_00401729 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_004023E5 NtQuerySystemInformation, | 6_2_004023E5 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_00401583 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_00401587 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, | 6_2_00401587 |
Source: C:\Users\user\AppData\Roaming\ifvwgru | Code function: 6_2_004026A0 NtEnumerateKey, | 6_2_004026A0 |
Source: 00000006.00000002.2485910630.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000006.00000002.2485885145.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000002.2270182856.0000000002D02000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.2269300413.0000000002BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000006.00000002.2486160796.0000000002EC3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000006.00000002.2485978515.0000000002CB1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000000.00000002.2269955686.0000000002CD1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000002.00000002.3447329337.0000000008751000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000000.00000002.2269686012.0000000002BC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000002.00000002.3444065573.0000000002F21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTR | Matched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56 |
Source: explorer.exe, 00000002.00000000.2256911237.000000000C354000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 00000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&B |
Source: explorer.exe, 00000002.00000002.3451553162.000000000C354000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: ?\#CdRom&Ven_NECVMWar&Prod_VMware_ |
Source: explorer.exe, 00000002.00000000.2254640839.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3447903568.000000000962B000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv |
Source: explorer.exe, 00000002.00000000.2255032281.00000000097F3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: explorer.exe, 00000002.00000002.3447903568.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000973C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWws |
Source: explorer.exe, 00000002.00000000.2256911237.000000000C354000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.2255032281.00000000098AD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom |
Source: explorer.exe, 00000002.00000000.2254640839.0000000009605000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTVMWare |
Source: explorer.exe, 00000002.00000000.2251375594.0000000000D99000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.2251375594.0000000000D99000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W |
Source: explorer.exe, 00000002.00000002.3447903568.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2254640839.000000000978C000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: explorer.exe, 00000002.00000002.3445199941.00000000073E5000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: explorer.exe, 00000002.00000000.2255032281.00000000098AD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6 |
Source: explorer.exe, 00000002.00000000.2251375594.0000000000D99000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000 |
Source: explorer.exe, 00000002.00000000.2251375594.0000000000D99000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000002.00000000.2255032281.00000000098AD000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |