Source: |
Binary string: mscorlib.pdbD source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: HP<o0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.pdbL} source: RegSvcs.exe, 00000004.00000002.3240349963.00000000066F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: Accessibility.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Accessibility.pdb\ source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: RegSvcs.pdb, source: AYT.exe.4.dr |
Source: |
Binary string: wntdll.pdbUGP source: 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2140368863.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2139603483.0000000004330000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2158369458.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2159078467.0000000004370000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: wntdll.pdb source: 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2140368863.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2139603483.0000000004330000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2158369458.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2159078467.0000000004370000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: System.Configuration.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdbH source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: RegSvcs.pdb source: AYT.exe.4.dr |
Source: |
Binary string: System.Configuration.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240349963.00000000066F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Xml.ni.pdbRSDS# source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Core.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: %%.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Windows.Forms.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Configuration.pdbp_ source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3235828494.0000000001657000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3235828494.00000000016B3000.00000004.00000020.00020000.00000000.sdmp, WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb[ source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.ni.pdbRSDSJ< source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Management.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Drawing.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Management.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Core.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: symbols\dll\mscorlib.pdbLb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb#Dnm. source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.pdb\m source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: @Ho.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: ?HoC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Configuration.ni.pdbRSDScUN source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Core.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
0_2_00452126 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, |
0_2_0045C999 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_00436ADE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00434BEE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0045DD7C FindFirstFileW,FindClose, |
0_2_0045DD7C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
0_2_0044BD29 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, |
0_2_00436D2D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00442E1F |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_00475FE5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_0044BF8D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
3_2_00452126 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, |
3_2_0045C999 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, |
3_2_00436ADE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
3_2_00434BEE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0045DD7C FindFirstFileW,FindClose, |
3_2_0045DD7C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
3_2_0044BD29 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, |
3_2_00436D2D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
3_2_00442E1F |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
3_2_00475FE5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
3_2_0044BF8D |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 154.216.18.238 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
0_2_0047C08E |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
3_2_0047C08E |
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.9348000 EDT8 EDQ-905.pdf.exe.2fa0000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 3.2.9348000 EDT8 EDQ-905.pdf.exe.3780000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000004.00000002.3235501812.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2144226778.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000003.00000002.2163788984.0000000003780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00412038 |
0_2_00412038 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00427161 |
0_2_00427161 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0047E1FA |
0_2_0047E1FA |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004212BE |
0_2_004212BE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00443390 |
0_2_00443390 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00443391 |
0_2_00443391 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0041A46B |
0_2_0041A46B |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0041240C |
0_2_0041240C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00446566 |
0_2_00446566 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004045E0 |
0_2_004045E0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0041D750 |
0_2_0041D750 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004037E0 |
0_2_004037E0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00427859 |
0_2_00427859 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00412818 |
0_2_00412818 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0040F890 |
0_2_0040F890 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0042397B |
0_2_0042397B |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00409A40 |
0_2_00409A40 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00411B63 |
0_2_00411B63 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0047CBF0 |
0_2_0047CBF0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044EBBC |
0_2_0044EBBC |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00412C38 |
0_2_00412C38 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044ED9A |
0_2_0044ED9A |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00423EBF |
0_2_00423EBF |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00424F70 |
0_2_00424F70 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0041AF0D |
0_2_0041AF0D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_04021FB0 |
0_2_04021FB0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00409A40 |
3_2_00409A40 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00412038 |
3_2_00412038 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00427161 |
3_2_00427161 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0047E1FA |
3_2_0047E1FA |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004212BE |
3_2_004212BE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00443390 |
3_2_00443390 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00443391 |
3_2_00443391 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0041A46B |
3_2_0041A46B |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0041240C |
3_2_0041240C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00446566 |
3_2_00446566 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004045E0 |
3_2_004045E0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0041D750 |
3_2_0041D750 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004037E0 |
3_2_004037E0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00427859 |
3_2_00427859 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00412818 |
3_2_00412818 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0040F890 |
3_2_0040F890 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0042397B |
3_2_0042397B |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00411B63 |
3_2_00411B63 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0047CBF0 |
3_2_0047CBF0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044EBBC |
3_2_0044EBBC |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00412C38 |
3_2_00412C38 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044ED9A |
3_2_0044ED9A |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00423EBF |
3_2_00423EBF |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00424F70 |
3_2_00424F70 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0041AF0D |
3_2_0041AF0D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_03F51FB0 |
3_2_03F51FB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00408C60 |
4_2_00408C60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_0040DC11 |
4_2_0040DC11 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00407C3F |
4_2_00407C3F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00418CCC |
4_2_00418CCC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00406CA0 |
4_2_00406CA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_004028B0 |
4_2_004028B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_0041A4BE |
4_2_0041A4BE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00418244 |
4_2_00418244 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00401650 |
4_2_00401650 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00402F20 |
4_2_00402F20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_004193C4 |
4_2_004193C4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00418788 |
4_2_00418788 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00402F89 |
4_2_00402F89 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00402B90 |
4_2_00402B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_004073A0 |
4_2_004073A0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_031ED158 |
4_2_031ED158 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_031E0FF8 |
4_2_031E0FF8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_031E1030 |
4_2_031E1030 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_07712820 |
4_2_07712820 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: String function: 0040E1D8 appears 44 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 00425210 appears 58 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 00445975 appears 130 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 0041171A appears 74 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 0041832D appears 52 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 004136BC appears 36 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 004092C0 appears 50 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 0041718C appears 90 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 00401B70 appears 46 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 0040E6D0 appears 70 times |
|
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: String function: 0043362D appears 38 times |
|
Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.9348000 EDT8 EDQ-905.pdf.exe.2fa0000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 3.2.9348000 EDT8 EDQ-905.pdf.exe.3780000.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000004.00000002.3235501812.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2144226778.0000000002FA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000003.00000002.2163788984.0000000003780000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, Helper.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, AlgorithmAES.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle, |
0_2_00464422 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, |
0_2_004364AA |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle, |
3_2_00464422 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState, |
3_2_004364AA |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: |
Binary string: mscorlib.pdbD source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: HP<o0C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.pdbL} source: RegSvcs.exe, 00000004.00000002.3240349963.00000000066F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: Accessibility.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Accessibility.pdb\ source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: RegSvcs.pdb, source: AYT.exe.4.dr |
Source: |
Binary string: wntdll.pdbUGP source: 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2140368863.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2139603483.0000000004330000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2158369458.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2159078467.0000000004370000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: wntdll.pdb source: 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2140368863.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000000.00000003.2139603483.0000000004330000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2158369458.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, 9348000 EDT8 EDQ-905.pdf.exe, 00000003.00000003.2159078467.0000000004370000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: System.Configuration.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdbH source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: RegSvcs.pdb source: AYT.exe.4.dr |
Source: |
Binary string: System.Configuration.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240349963.00000000066F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Xml.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Xml.ni.pdbRSDS# source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: Microsoft.VisualBasic.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Core.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: %%.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Windows.Forms.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Configuration.pdbp_ source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3235828494.0000000001657000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3235828494.00000000016B3000.00000004.00000020.00020000.00000000.sdmp, WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb[ source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.ni.pdbRSDSJ< source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Management.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Drawing.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: mscorlib.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Management.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: \??\C:\Windows\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Core.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: symbols\dll\mscorlib.pdbLb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb#Dnm. source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.Management.pdb\m source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: @Ho.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: ?HoC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: RegSvcs.exe, 00000004.00000002.3241044235.0000000006DCA000.00000004.00000010.00020000.00000000.sdmp |
Source: |
Binary string: System.Configuration.ni.pdbRSDScUN source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.ni.pdb source: WER5E88.tmp.dmp.9.dr |
Source: |
Binary string: System.Core.ni.pdbRSDS source: WER5E88.tmp.dmp.9.dr |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, Messages.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, Messages.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)}) |
Source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'gGndLaRn6boi9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'gGndLaRn6boi9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'gGndLaRn6boi9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'gGndLaRn6boi9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs |
High entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'gGndLaRn6boi9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB' |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
0_2_004772DE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
0_2_004375B0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
3_2_004772DE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
3_2_004375B0 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
0_2_00452126 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, |
0_2_0045C999 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_00436ADE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00434BEE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0045DD7C FindFirstFileW,FindClose, |
0_2_0045DD7C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
0_2_0044BD29 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, |
0_2_00436D2D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_00442E1F |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_00475FE5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_0044BF8D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose, |
3_2_00452126 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0045C999 FindFirstFileW,FindNextFileW,FindClose, |
3_2_0045C999 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose, |
3_2_00436ADE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
3_2_00434BEE |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0045DD7C FindFirstFileW,FindClose, |
3_2_0045DD7C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose, |
3_2_0044BD29 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle, |
3_2_00436D2D |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
3_2_00442E1F |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
3_2_00475FE5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose, |
3_2_0044BF8D |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.9.dr |
Binary or memory string: vmci.syshbin |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware, Inc. |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.9.dr |
Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.9.dr |
Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.9.dr |
Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: Amcache.hve.9.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.9.dr |
Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.9.dr |
Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.9.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: RegSvcs.exe, 00000004.00000002.3240497153.0000000006766000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx |
Source: Amcache.hve.9.dr |
Binary or memory string: vmci.sys |
Source: Amcache.hve.9.dr |
Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.9.dr |
Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.9.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware20,1 |
Source: Amcache.hve.9.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.9.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.9.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.9.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.9.dr |
Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.9.dr |
Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.9.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.9.dr |
Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0042202E SetUnhandledExceptionFilter, |
0_2_0042202E |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_004230F5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00417D93 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00421FA7 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0042202E SetUnhandledExceptionFilter, |
3_2_0042202E |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
3_2_004230F5 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
3_2_00417D93 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
3_2_00421FA7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
4_2_0040CE09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
4_2_0040E61C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
4_2_00416F6A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Code function: 4_2_004123F1 SetUnhandledExceptionFilter, |
4_2_004123F1 |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237597397.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: RegSvcs.exe PID: 3608, type: MEMORYSTR |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c5570.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43ded90.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309d58e.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340ee8.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.3340000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.309c6a6.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.RegSvcs.exe.43c6458.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000004.00000002.3238992933.00000000043C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237486712.0000000003340000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3236898593.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3239693650.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.3237597397.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: RegSvcs.exe PID: 3608, type: MEMORYSTR |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket, |
0_2_004741BB |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket, |
0_2_0046483C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject, |
0_2_0047AD92 |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket, |
3_2_004741BB |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket, |
3_2_0046483C |
Source: C:\Users\user\Desktop\9348000 EDT8 EDQ-905.pdf.exe |
Code function: 3_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject, |
3_2_0047AD92 |