Edit tour
Windows
Analysis Report
SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 49 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to infect the boot sector
Creates an undocumented autostart registry key
Found direct / indirect Syscall (likely to bypass EDR)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes many files with high entropy
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Binary contains a suspicious time stamp
Changes image file execution options
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Disables exception chain validation (SEHOP)
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Enables debug privileges
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses net.exe to stop services
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
query blbeacon for getting browser version
Classification
- System is w10x64
- SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.exe (PID: 6316 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Win32.Troj an.Agent.1 MWNV4.3104 4.30727.ex e" MD5: 647A2177841AEBE2F1BB1B3767F41287) - SecuriteInfo.com.Win32.Trojan.Agent.1MWNV4.31044.30727.tmp (PID: 6292 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-3VL HG.tmp\Sec uriteInfo. com.Win32. Trojan.Age nt.1MWNV4. 31044.3072 7.tmp" /SL 5="$402A0, 29027361,7 80800,C:\U sers\user\ Desktop\Se curiteInfo .com.Win32 .Trojan.Ag ent.1MWNV4 .31044.307 27.exe" MD5: 2C94C19646786C4EE5283B02FD8CE5A5) - saBSI.exe (PID: 5924 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-NAQ L6.tmp\pro d0_extract \saBSI.exe " /affid 9 1088 PaidD istributio n=true Cou ntryCode=U S MD5: 143255618462A577DE27286A272584E1) - avg_antivirus_free_setup.exe (PID: 2160 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-NAQ L6.tmp\pro d1_extract \avg_antiv irus_free_ setup.exe" /silent / ws /psh:92 pTu5hvrwhS 3vWuIpMbBB icEVfEyWA6 bnyEo3OuuR QXZ1N2XpOz ESFJqK8de1 eKO42XXRqt AtX7Tg MD5: 26816AF65F2A3F1C61FB44C682510C97) - avg_antivirus_free_online_setup.exe (PID: 5688 cmdline:
"C:\Window s\Temp\asw .a66b047c9 b0289ec\av g_antiviru s_free_onl ine_setup. exe" /sile nt /ws /ps h:92pTu5hv rwhS3vWuIp MbBBicEVfE yWA6bnyEo3 OuuRQXZ1N2 XpOzESFJqK 8de1eKO42X XRqtAtX7Tg /cookie:m mm_irs_ppi _902_451_o /ga_clien tid:b9592f c5-5741-4a 25-98a5-cc d83d3c903a /edat_dir :C:\Window s\Temp\asw .a66b047c9 b0289ec MD5: 4DE05BCEF050AB8FA30941A9E3454645) - icarus.exe (PID: 6504 cmdline:
C:\Windows \Temp\asw- b587398b-0 039-49f3-a 79c-a0dbe4 cb19f9\com mon\icarus .exe /icar us-info-pa th:C:\Wind ows\Temp\a sw-b587398 b-0039-49f 3-a79c-a0d be4cb19f9\ icarus-inf o.xml /ins tall /sile nt /ws /ps h:92pTu5hv rwhS3vWuIp MbBBicEVfE yWA6bnyEo3 OuuRQXZ1N2 XpOzESFJqK 8de1eKO42X XRqtAtX7Tg /cookie:m mm_irs_ppi _902_451_o /edat_dir :C:\Window s\Temp\asw .a66b047c9 b0289ec /t rack-guid: b9592fc5-5 741-4a25-9 8a5-ccd83d 3c903a MD5: B178E9C05511563BDF3A5097D9116197) - norton_secure_browser_setup.exe (PID: 5428 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-NAQ L6.tmp\pro d2_extract \norton_se cure_brows er_setup.e xe" /s /ma ke-default /run_sour ce="norton _ppi_is" MD5: F269C5140CBC0E376CC7354A801DDD16) - NortonBrowserUpdateSetup.exe (PID: 6904 cmdline:
NortonBrow serUpdateS etup.exe / silent /in stall "bun dlename=No rton Priva te Browser &appguid={ 3A3642E6-D E46-4F68-9 887-AA017E EFE426}&ap pname=Nort on Private Browser&n eedsadmin= true&lang= en-GB&bran d=29239&in stallargs= --no-creat e-user-sho rtcuts --m ake-chrome -default - -force-def ault-win10 --auto-im port-data% 3Dchrome - -import-co okies --au to-launch- chrome" MD5: 2B07E26D3C33CD96FA825695823BBFA7) - NortonBrowserUpdate.exe (PID: 6212 cmdline:
"C:\Progra m Files (x 86)\GUM98F E.tmp\Nort onBrowserU pdate.exe" /silent / install "b undlename= Norton Pri vate Brows er&appguid ={3A3642E6 -DE46-4F68 -9887-AA01 7EEFE426}& appname=No rton Priva te Browser &needsadmi n=true&lan g=en-GB&br and=29239& installarg s=--no-cre ate-user-s hortcuts - -make-chro me-default --force-d efault-win 10 --auto- import-dat a%3Dchrome --import- cookies -- auto-launc h-chrome" MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 1220 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /regsvc MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 5856 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /regserve r MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdateComRegisterShell64.exe (PID: 5288 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - NortonBrowserUpdateComRegisterShell64.exe (PID: 4088 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - NortonBrowserUpdateComRegisterShell64.exe (PID: 3896 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\1.8. 1649.5\Nor tonBrowser UpdateComR egisterShe ll64.exe" MD5: 35BDDD897E9CF97CF4074A930F78E496) - CheatEngine75.exe (PID: 5808 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-NAQ L6.tmp\Che atEngine75 .exe" /VER YSILENT /Z BDIST MD5: E0F666FE4FF537FB8587CCD215E41E5F) - CheatEngine75.tmp (PID: 2504 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-4SD R0.tmp\Che atEngine75 .tmp" /SL5 ="$90282,2 6511452,83 2512,C:\Us ers\user\A ppData\Loc al\Temp\is -NAQL6.tmp \CheatEngi ne75.exe" /VERYSILEN T /ZBDIST MD5: 9AA2ACD4C96F8BA03BB6C3EA806D806F) - net.exe (PID: 1704 cmdline:
"net" stop BadlionAn tic MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 4564 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 1068 cmdline:
C:\Windows \system32\ net1 stop BadlionAnt ic MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - net.exe (PID: 3616 cmdline:
"net" stop BadlionAn ticheat MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 6016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 928 cmdline:
C:\Windows \system32\ net1 stop BadlionAnt icheat MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - sc.exe (PID: 3396 cmdline:
"sc" delet e BadlionA ntic MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 6456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 1016 cmdline:
"sc" delet e BadlionA nticheat MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 4124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - _setup64.tmp (PID: 6448 cmdline:
helper 105 0x42C MD5: E4211D6D009757C078A9FAC7FF4F03D4) - conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - icacls.exe (PID: 6616 cmdline:
"icacls" " C:\Program Files\Che at Engine 7.5" /gran t *S-1-15- 2-1:(OI)(C I)(RX) MD5: 48C87E3B3003A2413D6399EA77707F5D) - conhost.exe (PID: 6664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Kernelmoduleunloader.exe (PID: 7120 cmdline:
"C:\Progra m Files\Ch eat Engine 7.5\Kerne lmoduleunl oader.exe" /SETUP MD5: 9AF96706762298CF72DF2A74213494C9) - windowsrepair.exe (PID: 2668 cmdline:
"C:\Progra m Files\Ch eat Engine 7.5\windo wsrepair.e xe" /s MD5: 9A4D1B5154194EA0C42EFEBEB73F318F) - icacls.exe (PID: 1988 cmdline:
"icacls" " C:\Program Files\Che at Engine 7.5" /gran t *S-1-15- 2-1:(OI)(C I)(RX) MD5: 48C87E3B3003A2413D6399EA77707F5D) - conhost.exe (PID: 5368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Cheat Engine.exe (PID: 2688 cmdline:
"C:\Progra m Files\Ch eat Engine 7.5\Cheat Engine.ex e" MD5: F921416197C2AE407D53BA5712C3930A) - cheatengine-x86_64-SSE4-AVX2.exe (PID: 4852 cmdline:
"C:\Progra m Files\Ch eat Engine 7.5\cheat engine-x86 _64-SSE4-A VX2.exe" MD5: 910DE25BD63B5DA521FC0B598920C4EC) - WerFault.exe (PID: 4476 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 292 -s 972 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 1720 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 1068 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 460 -p 62 92 -ip 629 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- NortonBrowserUpdate.exe (PID: 3336 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /c MD5: BF8FE62DBCD949547AF37EEE4ECE61FC)
- NortonBrowserUpdate.exe (PID: 5472 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /ua /inst allsource scheduler MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 6012 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /register msihelper MD5: BF8FE62DBCD949547AF37EEE4ECE61FC) - NortonBrowserUpdate.exe (PID: 5576 cmdline:
"C:\Progra m Files (x 86)\Norton \Browser\U pdate\Nort onBrowserU pdate.exe" /uninstal l MD5: BF8FE62DBCD949547AF37EEE4ECE61FC)
- msiexec.exe (PID: 6716 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
PlugXStrings | PlugX Identifying Strings | Seth Hardy |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
PlugXStrings | PlugX Identifying Strings | Seth Hardy |
|
System Summary |
---|
Source: | Author: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): |
Source: | Author: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: vburov: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Code function: | 5_2_002C14F0 | |
Source: | Code function: | 5_2_002C17A0 | |
Source: | Code function: | 5_2_00275870 | |
Source: | Code function: | 5_2_00276220 | |
Source: | Code function: | 5_2_002AE610 | |
Source: | Code function: | 5_2_002767B0 | |
Source: | Code function: | 5_2_002AEB60 | |
Source: | Code function: | 5_2_002AF150 | |
Source: | Code function: | 5_2_002AF3C0 | |
Source: | Code function: | 6_2_00A5B0E0 | |
Source: | Code function: | 6_2_00A582F0 | |
Source: | Code function: | 6_2_00A59250 | |
Source: | Code function: | 6_2_00A59450 | |
Source: | Code function: | 6_2_00A58DC0 | |
Source: | Code function: | 6_2_00A59020 | |
Source: | Code function: | 6_2_00A58260 | |
Source: | Code function: | 6_2_00A59340 | |
Source: | Code function: | 6_2_00A594D0 | |
Source: | Code function: | 6_2_00A58EF0 | |
Source: | Code function: | 6_2_00A72660 | |
Source: | Code function: | 7_2_6B04617F |
Source: | Binary or memory string: | memstr_0d947b04-c |
Compliance |
---|
Source: | Static PE information: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: | |||
Source: | Directory created: |
Source: | Registry value created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | Code function: | 7_2_00405B6C | |
Source: | Code function: | 7_2_004028D5 | |
Source: | Code function: | 7_2_0040679D | |
Source: | Code function: | 7_2_6B1E7010 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Code function: | 7_2_6B1E91E0 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: |