Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_004062D5 FindFirstFileW,FindClose, |
0_2_004062D5 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00402E18 FindFirstFileW, |
0_2_00402E18 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_00406C9B |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
10_2_001C4005 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
10_2_001CC2FF |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C494A GetFileAttributesW,FindFirstFileW,FindClose, |
10_2_001C494A |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CCD14 FindFirstFileW,FindClose, |
10_2_001CCD14 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
10_2_001CCD9F |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
10_2_001CF5D8 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
10_2_001CF735 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
10_2_001CFA36 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
10_2_001C3CE2 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: eddzD2MA12.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://crl.globalsign.net/root-r3.crl0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: eddzD2MA12.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: eddzD2MA12.exe |
String found in binary or memory: http://ocsp.digicert.com0 |
Source: eddzD2MA12.exe |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: eddzD2MA12.exe |
String found in binary or memory: http://ocsp.digicert.com0C |
Source: eddzD2MA12.exe |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: eddzD2MA12.exe |
String found in binary or memory: http://www.digicert.com/CPS0 |
Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/profiles/76561199800374635 |
Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://steamcommunity.com/profiles/76561199800374635do88eqMozilla/5.0 |
Source: Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/ |
Source: Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/1 |
Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928444243.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/gos90t |
Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/gos90t213 |
Source: Mother.pif, 0000000A.00000002.2928444243.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/gos90tD |
Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/gos90tdo88eqsqlo.dllMozilla/5.0 |
Source: Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/r |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: Mother.pif.1.dr |
String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.dr |
String found in binary or memory: https://www.globalsign.com/repository/06 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, |
0_2_004050CD |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001ED164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
10_2_001ED164 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx, |
0_2_00403883 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, |
10_2_001C5778 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_0040497C |
0_2_0040497C |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00406ED2 |
0_2_00406ED2 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_004074BB |
0_2_004074BB |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0016B020 |
10_2_0016B020 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001694E0 |
10_2_001694E0 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00169C80 |
10_2_00169C80 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001823F5 |
10_2_001823F5 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001E8400 |
10_2_001E8400 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00196502 |
10_2_00196502 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0019265E |
10_2_0019265E |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0016E6F0 |
10_2_0016E6F0 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0018282A |
10_2_0018282A |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001989BF |
10_2_001989BF |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001E0A3A |
10_2_001E0A3A |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00196A74 |
10_2_00196A74 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00170BE0 |
10_2_00170BE0 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0018CD51 |
10_2_0018CD51 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001BEDB2 |
10_2_001BEDB2 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C8E44 |
10_2_001C8E44 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001E0EB7 |
10_2_001E0EB7 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00196FE6 |
10_2_00196FE6 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001833B7 |
10_2_001833B7 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0018F409 |
10_2_0018F409 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0017D45D |
10_2_0017D45D |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0017F628 |
10_2_0017F628 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00161663 |
10_2_00161663 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001816B4 |
10_2_001816B4 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0016F6A0 |
10_2_0016F6A0 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001878C3 |
10_2_001878C3 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00181BA8 |
10_2_00181BA8 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0018DBA5 |
10_2_0018DBA5 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00199CE5 |
10_2_00199CE5 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0017DD28 |
10_2_0017DD28 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_0018BFD6 |
10_2_0018BFD6 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00181FC0 |
10_2_00181FC0 |
Source: unknown |
Process created: C:\Users\user\Desktop\eddzD2MA12.exe "C:\Users\user\Desktop\eddzD2MA12.exe" |
|
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif v |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 |
|
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif v |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: riched20.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: usp10.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: framedynos.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: dbghelp.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: napinsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: pnrpnsp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: wshbth.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: nlaapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: winrnr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: dbghelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001E59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
10_2_001E59B3 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_00175EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
10_2_00175EDA |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001833B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
10_2_001833B7 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
Jump to behavior |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_004062D5 FindFirstFileW,FindClose, |
0_2_004062D5 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00402E18 FindFirstFileW, |
0_2_00402E18 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Code function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_00406C9B |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
10_2_001C4005 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
10_2_001CC2FF |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C494A GetFileAttributesW,FindFirstFileW,FindClose, |
10_2_001C494A |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CCD14 FindFirstFileW,FindClose, |
10_2_001CCD14 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
10_2_001CCD9F |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
10_2_001CF5D8 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
10_2_001CF735 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
10_2_001CFA36 |
Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pif |
Code function: 10_2_001C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
10_2_001C3CE2 |
Source: C:\Users\user\Desktop\eddzD2MA12.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\tasklist.exe tasklist |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif v |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 |
Jump to behavior |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR |