Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2582039404.000001A67205A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575123868.000001A674555000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2576104094.000001A6745D2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575191082.000001A6746F4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575503275.000001A6746F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2567011110.000001A67445A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2566337593.000001A674501000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0RobotoLight |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2576260212.000001A67481A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0RobotoMedium |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2565914201.000001A6745A8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2566337593.000001A674501000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0RobotoThin |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2569629019.000001A67205A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575225773.000001A672059000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0en-us |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575723651.000001A672059000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0eserved. |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2582119199.000001A67205A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2581966011.000001A67205A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2582267384.000001A67205A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2581850626.000001A67205A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2582039404.000001A67205A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0us |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575301669.000001A672059000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0v |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575256547.000001A672059000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0ved. |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575225773.000001A672059000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000003.2575256547.000001A672059000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0ved..0 |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671D08000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/vs/16/release/vc_redist.x64.exe |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://google.com/ |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://google.com/e/up-d |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671EC3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/#pricing |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/discord |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550183597.000000760C1F4000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550427979.000001A66FBA9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671D08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/spf.exe |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671D08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/spf.exe9 |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550427979.000001A66FBA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/spf.exen |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550427979.000001A66FBA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/spf.exep |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550183597.000000760C1F4000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/spf.exes# |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671EC3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/troubleshooting/#usage |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550427979.000001A66FBA9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671D08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/version.txt |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4550427979.000001A66FBA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/version.txt. |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4552121388.000001A671D08000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://reported.lol/version.txtw |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://yahoo.com/ |
Source: SecuriteInfo.com.FileRepMalware.12585.5759.exe, 00000000.00000002.4553170862.000001A674342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://yahoo.com/ve/u |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3140:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6020:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6368:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5752:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6752:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7124:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3572:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6496:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3652:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5488:120:WilError_03 |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C sc stop bam | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop bam | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C SC CONFIG "bam" START= DISABLED | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe SC CONFIG "bam" START= DISABLED | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C fsutil behavior set DisableLastAccess 3 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fsutil.exe fsutil behavior set DisableLastAccess 3 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /hibernate off | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /hibernate off | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -hibernate-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -disk-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -disk-timeout-ac 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -disk-timeout-dc 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -disk-timeout-dc 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\w32tm.exe w32tm /resync | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\taskkill.exe taskkill /F /IM agent.exe | |
Source: C:\Windows\System32\w32tm.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\taskkill.exe taskkill /F /IM battle.net.exe | |
Source: C:\Windows\System32\taskkill.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\taskkill.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C sc stop bam | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C SC CONFIG "bam" START= DISABLED | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C fsutil behavior set DisableLastAccess 3 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /hibernate off | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -disk-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -disk-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /C powercfg /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\w32tm.exe w32tm /resync | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\taskkill.exe taskkill /F /IM agent.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Process created: C:\Windows\System32\cmd.exe cmd /C fsutil behavior set DisableLastAccess 3 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc stop bam | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe SC CONFIG "bam" START= DISABLED | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\fsutil.exe fsutil behavior set DisableLastAccess 3 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /hibernate off | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -disk-timeout-ac 0 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -disk-timeout-dc 0 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: tbs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: slwga.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: icm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: uiautomationcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | Section loaded: icu.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Windows\System32\w32tm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\taskkill.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35CE9F second address: 7FF68B35CEB7 instructions: 0x00000000 rdtsc 0x00000002 dec esp 0x00000003 mov dword ptr [esp+20h], ebp 0x00000007 lahf 0x00000008 dec eax 0x00000009 mov eax, dword ptr [esp+20h] 0x0000000d movzx edx, dx 0x00000010 mov dx, 950Ch 0x00000014 dec eax 0x00000015 mov dword ptr [ebp-18h], eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35D258 second address: 7FF68B35D2A3 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 arpl di, dx 0x00000005 dec eax 0x00000006 mov eax, AA40D7AFh 0x0000000b call far BF0Fh : 4114B9BFh 0x00000012 retf 0x00000013 not dx 0x00000016 dec eax 0x00000017 mov dword ptr [esp+20h], eax 0x0000001b dec eax 0x0000001c mov eax, dword ptr [esp+20h] 0x00000020 inc cx 0x00000022 movzx ecx, ah 0x00000025 dec eax 0x00000026 mov dword ptr [ebp+30h], eax 0x00000029 dec eax 0x0000002a mov eax, 95C2F027h 0x0000002f call 00007FD54DA59F65h 0x00000034 mov dword ptr [esp+20h], eax 0x00000038 cwde 0x00000039 bswap dx 0x0000003c dec eax 0x0000003d mov eax, dword ptr [esp+20h] 0x00000041 dec eax 0x00000042 movzx ecx, cx 0x00000045 bswap ecx 0x00000047 dec eax 0x00000048 mov dword ptr [ebp+38h], eax 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35D69A second address: 7FF68B35D6E3 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [esp+20h], ecx 0x00000007 dec eax 0x00000008 mov eax, dword ptr [esp+20h] 0x0000000c dec eax 0x0000000d mov dword ptr [ebp+00000088h], eax 0x00000013 dec eax 0x00000014 movsx eax, si 0x00000017 inc ecx 0x00000018 movsx edx, sp 0x0000001b dec eax 0x0000001c xchg eax, edx 0x0000001d dec eax 0x0000001e mov dword ptr [esp+20h], edi 0x00000022 dec eax 0x00000023 mov eax, dword ptr [esp+20h] 0x00000027 cwd 0x00000029 dec eax 0x0000002a movsx edx, cx 0x0000002d inc ax 0x0000002f movsx edx, ah 0x00000032 dec eax 0x00000033 mov dword ptr [ebp+00000F70h], eax 0x00000039 cwde 0x0000003a jmp 00007FD5050AEBCAh 0x0000003f dec eax 0x00000040 mov dword ptr [esp+20h], ecx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35D83E second address: 7FF68B35D8B6 instructions: 0x00000000 rdtsc 0x00000002 not dx 0x00000005 dec eax 0x00000006 mov eax, B444E9AFh 0x0000000b xchg eax, ecx 0x0000000c scasd 0x0000000d stosb 0x0000000e insb 0x0000000f dec eax 0x00000010 arpl bp, dx 0x00000012 cdq 0x00000013 jmp 00007FD505072345h 0x00000018 dec eax 0x00000019 mov dword ptr [esp+20h], eax 0x0000001d cwde 0x0000001e cdq 0x0000001f dec eax 0x00000020 mov eax, dword ptr [esp+20h] 0x00000024 dec eax 0x00000025 movsx ecx, sp 0x00000028 inc ecx 0x00000029 mov edx, edi 0x0000002b dec eax 0x0000002c mov dword ptr [ebp+000000A0h], eax 0x00000032 lahf 0x00000033 movsx eax, bp 0x00000036 dec eax 0x00000037 mov ecx, 95E8B362h 0x0000003c call 00007FD54DA59F65h 0x00000041 mov dword ptr [esp+20h], ecx 0x00000045 dec eax 0x00000046 cwde 0x00000047 mov dl, 92h 0x00000049 movsx eax, ax 0x0000004c dec eax 0x0000004d mov eax, dword ptr [esp+20h] 0x00000051 dec eax 0x00000052 mov dword ptr [ebp+000000A8h], eax 0x00000058 inc ecx 0x00000059 movsx edx, bx 0x0000005c dec eax 0x0000005d cdq 0x0000005e dec eax 0x0000005f mov eax, DA2D9E85h 0x00000064 cmc 0x00000065 int CDh 0x00000067 inc esi 0x00000068 dec ecx 0x00000069 movzx edx, cx 0x0000006c jmp 00007FD505072347h 0x00000071 dec eax 0x00000072 mov dword ptr [esp+20h], eax 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35DA32 second address: 7FF68B35DAC2 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, 9C6BDDAFh 0x00000008 aad 88h 0x0000000a mov ch, 36h 0x0000000c not dl 0x0000000e inc ax 0x00000010 movzx edx, ch 0x00000013 cwd 0x00000015 dec eax 0x00000016 mov dword ptr [esp+20h], eax 0x0000001a inc ax 0x0000001c movsx edx, bh 0x0000001f dec eax 0x00000020 mov eax, dword ptr [esp+20h] 0x00000024 dec ecx 0x00000025 arpl cx, dx 0x00000027 not dx 0x0000002a dec eax 0x0000002b mov dword ptr [ebp+00000410h], eax 0x00000031 dec eax 0x00000032 mov eax, F09ADC0Eh 0x00000037 call far D363h : 48E6190Eh 0x0000003e xchg dh, dl 0x00000040 dec eax 0x00000041 mov dword ptr [esp+20h], eax 0x00000045 dec eax 0x00000046 bswap eax 0x00000048 cbw 0x0000004a dec eax 0x0000004b mov eax, dword ptr [esp+20h] 0x0000004f dec eax 0x00000050 movzx ecx, bx 0x00000053 dec eax 0x00000054 mov dword ptr [ebp+00000418h], eax 0x0000005a dec eax 0x0000005b cdq 0x0000005c dec eax 0x0000005d mov ecx, ebp 0x0000005f not ax 0x00000062 dec eax 0x00000063 mov eax, 1562FC02h |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35DAC2 second address: 7FF68B35DB36 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 xchg eax, edx 0x00000004 dec esp 0x00000005 mov dword ptr [esp+20h], esi 0x00000009 cwde 0x0000000a cbw 0x0000000c dec eax 0x0000000d mov eax, dword ptr [esp+20h] 0x00000011 jmp 00007FD50507234Bh 0x00000016 dec eax 0x00000017 mov dword ptr [ebp+00000428h], eax 0x0000001d cwde 0x0000001e dec eax 0x0000001f mov eax, DA2D9E85h 0x00000024 cmc 0x00000025 int CDh 0x00000027 inc esi 0x00000028 dec eax 0x00000029 movsx edx, di 0x0000002c inc ax 0x0000002e movsx ecx, bh 0x00000031 dec eax 0x00000032 cdq 0x00000033 dec eax 0x00000034 mov dword ptr [esp+20h], eax 0x00000038 mov ax, bp 0x0000003b dec eax 0x0000003c mov eax, dword ptr [esp+20h] 0x00000040 dec eax 0x00000041 mov dword ptr [ebp+00000F70h], eax 0x00000047 dec eax 0x00000048 mov eax, 95E8B362h 0x0000004d call 00007FD56BA59F65h 0x00000052 cdq 0x00000053 dec eax 0x00000054 mov dword ptr [esp+20h], eax 0x00000058 bswap ax 0x0000005b cdq 0x0000005c dec eax 0x0000005d mov eax, dword ptr [esp+20h] 0x00000061 cdq 0x00000062 dec eax 0x00000063 mov dword ptr [ebp+00000F78h], eax 0x00000069 dec esp 0x0000006a mov dword ptr [esp+20h], edi 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35DD06 second address: 7FF68B35DD17 instructions: 0x00000000 rdtsc 0x00000002 inc cx 0x00000004 cmove edx, ebp 0x00000007 dec eax 0x00000008 mov ecx, 95E8B362h 0x0000000d call 00007FD514A967E5h |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35DD17 second address: 7FF68B35DD4B instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [esp+20h], ecx 0x00000007 bswap ax 0x0000000a dec eax 0x0000000b mov eax, dword ptr [esp+20h] 0x0000000f dec eax 0x00000010 bswap edx 0x00000012 dec eax 0x00000013 mov dword ptr [ebp+000000D8h], eax 0x00000019 movsx dx, ch 0x0000001d inc ecx 0x0000001e movsx edx, bp 0x00000021 mov ah, FFFFFFA1h 0x00000024 dec eax 0x00000025 mov eax, DA2D9E85h 0x0000002a cmc 0x0000002b int CDh 0x0000002d inc esi 0x0000002e cdq 0x0000002f dec eax 0x00000030 mov dword ptr [esp+20h], eax 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35E001 second address: 7FF68B35E032 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [esp+20h], edi 0x00000007 inc ecx 0x00000008 movzx ecx, si 0x0000000b mov cx, ax 0x0000000e dec eax 0x0000000f mov eax, dword ptr [esp+20h] 0x00000013 cmovns dx, bp 0x00000017 dec eax 0x00000018 mov dword ptr [ebp+00000F70h], eax 0x0000001e cbw 0x00000020 dec eax 0x00000021 mov eax, 95E8B362h 0x00000026 call 00007FD4B6A967E5h 0x0000002b or ecx, dword ptr [eax-77h] 0x0000002e inc esp 0x0000002f and al, 20h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35E3BE second address: 7FF68B35E3F7 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [esp+20h], edi 0x00000007 jmp 00007FD50507234Ah 0x0000000c dec eax 0x0000000d mov eax, dword ptr [esp+20h] 0x00000011 dec eax 0x00000012 cdq 0x00000013 dec eax 0x00000014 mov dword ptr [ebp+00000F70h], eax 0x0000001a cdq 0x0000001b dec eax 0x0000001c mov eax, 95E8B362h 0x00000021 call 00007FD54EA59F65h 0x00000026 movsx ecx, dx 0x00000029 cwd 0x0000002b dec eax 0x0000002c cdq 0x0000002d dec eax 0x0000002e mov dword ptr [esp+20h], eax 0x00000032 dec eax 0x00000033 cwde 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B35EF7F second address: 7FF68B35EF98 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, A944D2AFh 0x00000008 or dword ptr [ecx-6699F57Fh], 0F48D2F6h 0x00000012 mov bh, C8h 0x00000014 dec eax 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36010C second address: 7FF68B36014A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, B444C9AFh 0x00000008 xchg eax, ecx 0x00000009 mov byte ptr [BF0F35BAh], al 0x0000000e ror byte ptr [eax-77h], cl 0x00000011 inc esp 0x00000012 and al, 20h 0x00000014 dec ecx 0x00000015 arpl sp, cx 0x00000017 xchg cx, dx 0x0000001a dec eax 0x0000001b mov eax, dword ptr [esp+20h] 0x0000001f dec eax 0x00000020 movzx edx, ax 0x00000023 setnle ch 0x00000026 dec eax 0x00000027 mov dword ptr [ebp+00000490h], eax 0x0000002d xchg ax, dx 0x0000002f dec eax 0x00000030 mov eax, FB9AD629h 0x00000035 lea ecx, dword ptr [ecx+edi-1Ah] 0x00000039 dec eax 0x0000003a mov dword ptr [esp+20h], eax 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36014A second address: 7FF68B360166 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, dword ptr [esp+20h] 0x00000007 mov cx, C1B2h 0x0000000b dec ecx 0x0000000c arpl cx, cx 0x0000000e dec eax 0x0000000f cdq 0x00000010 dec eax 0x00000011 mov dword ptr [ebp+00000498h], eax 0x00000017 inc cx 0x00000019 movzx eax, dh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B360166 second address: 7FF68B36019F instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, 670DBA17h 0x00000008 jmp far CA0Fh : 662AFB2Dh 0x0000000f inc ax 0x00000011 movsx edx, ch 0x00000014 dec eax 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 movsx eax, si 0x0000001c dec eax 0x0000001d mov eax, dword ptr [esp+20h] 0x00000021 dec eax 0x00000022 mov dword ptr [ebp+000004A0h], eax 0x00000028 dec ecx 0x00000029 movzx ecx, bp 0x0000002c dec eax 0x0000002d mov ecx, A2FD518Ch 0x00000032 add ah, ch 0x00000034 dec esp 0x00000035 jo 00007FD50507238Bh 0x00000037 arpl bp, ax 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36019F second address: 7FF68B3601AC instructions: 0x00000000 rdtsc 0x00000002 mov dh, bl 0x00000004 dec eax 0x00000005 mov dword ptr [esp+20h], ecx 0x00000009 not dh 0x0000000b cwd 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36099C second address: 7FF68B360A22 instructions: 0x00000000 rdtsc 0x00000002 movsx eax, si 0x00000005 dec eax 0x00000006 mov eax, F689FB42h 0x0000000b add dword ptr [ebp+0Eh], FFFFFFB4h 0x0000000f inc ebp 0x00000010 movzx esp, dx 0x00000013 dec eax 0x00000014 movzx ecx, ax 0x00000017 jmp 00007FD505072345h 0x0000001c dec eax 0x0000001d mov dword ptr [esp+20h], eax 0x00000021 inc ecx 0x00000022 mov dl, cl 0x00000024 dec eax 0x00000025 mov eax, dword ptr [esp+20h] 0x00000029 not edx 0x0000002b inc esp 0x0000002c xchg cl, ah 0x0000002e dec ecx 0x0000002f bswap esp 0x00000031 dec eax 0x00000032 mov dword ptr [ebp+000004D8h], eax 0x00000038 movzx ecx, bp 0x0000003b dec eax 0x0000003c mov dword ptr [esp+20h], edi 0x00000040 dec eax 0x00000041 movsx eax, si 0x00000044 dec eax 0x00000045 mov eax, dword ptr [esp+20h] 0x00000049 mov cl, ch 0x0000004b dec eax 0x0000004c mov dword ptr [ebp+000004E0h], eax 0x00000052 dec ecx 0x00000053 not esp 0x00000055 dec esp 0x00000056 mov dword ptr [esp+20h], ebp 0x0000005a setne ch 0x0000005d dec eax 0x0000005e mov eax, dword ptr [esp+20h] 0x00000062 movsx ecx, sp 0x00000065 dec eax 0x00000066 mov dword ptr [ebp+000004E8h], eax 0x0000006c inc ecx 0x0000006d cmovb edx, ecx 0x00000070 inc ecx 0x00000071 mov esp, C20656B2h 0x00000076 dec eax 0x00000077 cwde 0x00000078 dec ecx 0x00000079 mov esp, DA2D9E85h 0x0000007e cmc 0x0000007f int CDh 0x00000081 inc esi 0x00000082 cmovnbe ax, ax 0x00000086 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36130B second address: 7FF68B36135D instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, dword ptr [esp+20h] 0x00000007 dec eax 0x00000008 movsx ecx, si 0x0000000b dec eax 0x0000000c mov dword ptr [ebp+000004F8h], eax 0x00000012 setl ah 0x00000015 dec esp 0x00000016 mov dword ptr [esp+20h], esi 0x0000001a dec eax 0x0000001b mov eax, dword ptr [esp+20h] 0x0000001f cdq 0x00000020 cwd 0x00000022 xchg dx, cx 0x00000025 dec eax 0x00000026 mov dword ptr [ebp+00000500h], eax 0x0000002c cbw 0x0000002e dec esp 0x0000002f mov dword ptr [esp+20h], ebp 0x00000033 jmp 00007FD5050AEBC8h 0x00000038 dec eax 0x00000039 mov eax, dword ptr [esp+20h] 0x0000003d dec ecx 0x0000003e movsx edx, di 0x00000041 dec eax 0x00000042 mov dword ptr [ebp+00000508h], eax 0x00000048 mov eax, 7924AFB0h 0x0000004d cwd 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B361B9B second address: 7FF68B361BB9 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 mov ecx, ecx 0x00000005 dec eax 0x00000006 mov eax, dword ptr [esp+20h] 0x0000000a jmp 00007FD505072349h 0x0000000f dec eax 0x00000010 mov dword ptr [ebp-78h], eax 0x00000013 dec esp 0x00000014 mov dword ptr [esp+20h], ebp 0x00000018 cwd 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B3620E3 second address: 7FF68B36211D instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cwde 0x00000004 dec eax 0x00000005 mov eax, A943FAAFh 0x0000000a test dword ptr [edi-3075BEBAh], esi 0x00000011 cdq 0x00000012 dec eax 0x00000013 mov dword ptr [esp+20h], eax 0x00000017 cbw 0x00000019 movsx eax, dx 0x0000001c dec eax 0x0000001d mov eax, dword ptr [esp+20h] 0x00000021 dec eax 0x00000022 movzx ecx, di 0x00000025 inc cx 0x00000027 movsx ecx, bl 0x0000002a dec ecx 0x0000002b movsx edx, dx 0x0000002e dec eax 0x0000002f mov dword ptr [ebp-30h], eax 0x00000032 dec eax 0x00000033 cwde 0x00000034 cdq 0x00000035 dec esp 0x00000036 mov dword ptr [esp+20h], edi 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B363F56 second address: 7FF68B363F8B instructions: 0x00000000 rdtsc 0x00000002 mov edx, 8127D714h 0x00000007 cwd 0x00000009 dec eax 0x0000000a mov eax, dword ptr [esp+20h] 0x0000000e inc ecx 0x0000000f movsx ecx, bx 0x00000012 dec eax 0x00000013 mov dword ptr [ebp+00000160h], eax 0x00000019 inc ebp 0x0000001a movzx esi, si 0x0000001d dec ecx 0x0000001e mov esi, 95C28754h 0x00000023 call 00007FD54DA59F65h 0x00000028 cwde 0x00000029 mov dh, FFFFFF8Eh 0x0000002c dec ecx 0x0000002d movzx ecx, di 0x00000030 dec esp 0x00000031 mov dword ptr [esp+20h], esi 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B364400 second address: 7FF68B364433 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cdq 0x00000004 cwd 0x00000006 dec eax 0x00000007 mov dword ptr [esp+20h], esi 0x0000000b dec eax 0x0000000c movsx ecx, bx 0x0000000f mov ax, cx 0x00000012 dec eax 0x00000013 mov eax, dword ptr [esp+20h] 0x00000017 cdq 0x00000018 dec eax 0x00000019 mov dword ptr [ebp+000001B8h], eax 0x0000001f dec esp 0x00000020 mov dword ptr [esp+20h], esp 0x00000024 lahf 0x00000025 xchg ah, dh 0x00000027 dec eax 0x00000028 mov eax, dword ptr [esp+20h] 0x0000002c dec eax 0x0000002d mov dword ptr [ebp+00000F40h], eax 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B364AFB second address: 7FF68B364B06 instructions: 0x00000000 rdtsc 0x00000002 dec esp 0x00000003 mov dword ptr [esp+20h], edi 0x00000007 inc ecx 0x00000008 setle ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B365164 second address: 7FF68B365174 instructions: 0x00000000 rdtsc 0x00000002 dec ecx 0x00000003 movsx ecx, cx 0x00000006 dec eax 0x00000007 mov edi, 95E8B362h 0x0000000c call 00007FD514A967E5h |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B36544F second address: 7FF68B3654C7 instructions: 0x00000000 rdtsc 0x00000002 not ah 0x00000004 dec eax 0x00000005 mov eax, A954CDAFh 0x0000000a pushfd 0x0000000b mov dword ptr [0F4823B9h], eax 0x00000010 mov bh, CAh 0x00000012 dec eax 0x00000013 mov dword ptr [esp+20h], eax 0x00000017 dec eax 0x00000018 mov eax, dword ptr [esp+20h] 0x0000001c cdq 0x0000001d dec eax 0x0000001e mov dword ptr [ebp+00000250h], eax 0x00000024 dec ecx 0x00000025 arpl sp, dx 0x00000027 dec ecx 0x00000028 movzx eax, bx 0x0000002b movsx eax, di 0x0000002e dec eax 0x0000002f mov eax, F989DD10h 0x00000034 wait 0x00000035 or bh, byte ptr [esi+ebx*4+48h] 0x00000039 mov dword ptr [esp+20h], eax 0x0000003d inc ecx 0x0000003e mov edx, edi 0x00000040 dec eax 0x00000041 mov eax, dword ptr [esp+20h] 0x00000045 dec ecx 0x00000046 arpl bx, dx 0x00000048 dec eax 0x00000049 mov dword ptr [ebp+00000258h], eax 0x0000004f lahf 0x00000050 xchg ch, al 0x00000052 jmp 00007FD505072345h 0x00000057 dec esp 0x00000058 mov dword ptr [esp+20h], ebp 0x0000005c bswap ax 0x0000005f cwd 0x00000061 dec eax 0x00000062 movsx ecx, bx 0x00000065 dec eax 0x00000066 mov eax, dword ptr [esp+20h] 0x0000006a dec eax 0x0000006b mov dword ptr [ebp+00000F40h], eax 0x00000071 dec eax 0x00000072 movzx edx, si 0x00000075 movzx ecx, si 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B365EC3 second address: 7FF68B365F78 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, B748F3AFh |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B28AEEA second address: 7FF68B28AF5D instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov dword ptr [esp+40h], esi 0x00000007 dec eax 0x00000008 mov eax, dword ptr [esp+40h] 0x0000000c movsx ecx, si 0x0000000f inc ebp 0x00000010 xchg ecx, ecx 0x00000012 jmp 00007FD505072345h 0x00000017 dec eax 0x00000018 mov dword ptr [ebp+18h], eax 0x0000001b inc esp 0x0000001c mov ecx, ebp 0x0000001e inc cx 0x00000020 nop 0x00000021 dec eax 0x00000022 mov dword ptr [esp+40h], edi 0x00000026 movsx eax, si 0x00000029 inc cx 0x0000002b bswap eax 0x0000002d dec eax 0x0000002e mov eax, dword ptr [esp+40h] 0x00000032 inc sp 0x00000034 mov eax, edx 0x00000036 dec ebp 0x00000037 movzx ecx, sp 0x0000003a dec eax 0x0000003b mov dword ptr [ebp+20h], eax 0x0000003e dec ecx 0x0000003f mov ecx, 3E1ADC8Bh 0x00000045 cbw 0x00000047 dec esp 0x00000048 arpl bp, ax 0x0000004a dec eax 0x0000004b mov dword ptr [esp+40h], ebx 0x0000004f dec eax 0x00000050 movzx edx, cx 0x00000053 inc ecx 0x00000054 not cl 0x00000056 dec eax 0x00000057 cdq 0x00000058 dec eax 0x00000059 mov eax, dword ptr [esp+40h] 0x0000005d dec eax 0x0000005e mov dword ptr [ebp+28h], eax 0x00000061 inc ax 0x00000063 movsx eax, ch 0x00000066 dec eax 0x00000067 arpl bx, ax 0x00000069 movdqa xmm0, dqword ptr [esp+50h] 0x0000006f xorps xmm0, dqword ptr [ebp+00h] 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B28AF5D second address: 7FF68B28AF9D instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 sete cl 0x00000006 movdqa dqword ptr [esp+50h], xmm0 0x0000000c cdq 0x0000000d movdqa xmm1, dqword ptr [esp+60h] 0x00000013 dec eax 0x00000014 movzx ecx, di 0x00000017 dec ecx 0x00000018 movsx edx, cx 0x0000001b jmp 00007FD5050AEBC5h 0x00000020 xorps xmm1, dqword ptr [ebp+10h] 0x00000024 movsx edx, sp 0x00000027 xchg dh, cl 0x00000029 movdqa dqword ptr [esp+60h], xmm1 0x0000002f inc ecx 0x00000030 mov dl, al 0x00000032 lahf 0x00000033 movdqa xmm0, dqword ptr [esp+70h] 0x00000039 dec esp 0x0000003a arpl bp, cx 0x0000003c xorps xmm0, dqword ptr [ebp+20h] 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | RDTSC instruction interceptor: First address: 7FF68B28D79A second address: 7FF68B28D7D0 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 mov eax, dword ptr [ebp-79h] 0x00000006 inc cx 0x00000008 movzx edx, bl 0x0000000b dec eax 0x0000000c mov dword ptr [ebp-09h], eax 0x0000000f dec eax 0x00000010 mov eax, A4E952DAh 0x00000015 inc ebx 0x00000017 add al, 3Dh 0x00000019 dec eax 0x0000001a mov dword ptr [ebp-79h], eax 0x0000001d movsx edx, bp 0x00000020 inc esp 0x00000021 xchg al, al 0x00000023 dec eax 0x00000024 mov eax, dword ptr [ebp-79h] 0x00000027 dec eax 0x00000028 cdq 0x00000029 inc sp 0x0000002b cmovnle eax, ebp 0x0000002e dec eax 0x0000002f movzx edx, cx 0x00000032 dec eax 0x00000033 mov dword ptr [ebp-01h], eax 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B8CA37D | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68C3CDBFB | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B90BA51 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQueryInformationProcess: Direct from: 0x7FF68C3CB5E1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B8F8453 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtSetInformationThread: Direct from: 0x7FF68E1A0834 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQuerySystemInformation: Direct from: 0x7FF68E9643C2 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B8FA464 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B91184D | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtSetInformationThread: Direct from: 0x7FF68C3F02E5 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQuerySystemInformation: Direct from: 0x7FF68B90832B | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68C3F0B87 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQueryInformationProcess: Direct from: 0x7FF68C3E30E2 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQueryInformationProcess: Direct from: 0x7FF68C3BAAD1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQuerySystemInformation: Direct from: 0x7FF68C3D5E1E | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtSetInformationThread: Direct from: 0x7FF6895DBCEB | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtClose: Indirect: 0x7FF68E96C1B3 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68B903050 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQuerySystemInformation: Direct from: 0x7FF68E964AE8 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQueryInformationProcess: Direct from: 0x7FF68B90FAF6 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtProtectVirtualMemory: Direct from: 0x7FF68C3DD36D | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQueryInformationProcess: Direct from: 0x7FF68C3C8BE8 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtSetInformationProcess: Direct from: 0x7FF68C3EC854 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12585.5759.exe | NtQuerySystemInformation: Direct from: 0x7FF68B908B97 | Jump to behavior |