Click to jump to signature section
Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mail.showpiece.trillennium.biz |
Source: lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://r11.i.lencr.org/0 |
Source: lUy4SKlE6A.exe, 00000000.00000002.4560857646.00000000060E8000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://r11.o.lencr.org0# |
Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://showpiece.trillennium.biz |
Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, lUy4SKlE6A.exe, 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: lUy4SKlE6A.exe | String found in binary or memory: https://account.dyn.com/ |
Source: lUy4SKlE6A.exe | String found in binary or memory: https://api.ipify.org |
Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/ |
Source: lUy4SKlE6A.exe, 00000000.00000002.4559214626.00000000029F1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/t |
Source: lUy4SKlE6A.exe, type: SAMPLE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027C4A98 | 0_2_027C4A98 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027CA960 | 0_2_027CA960 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027C3E80 | 0_2_027C3E80 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027C41C8 | 0_2_027C41C8 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06495648 | 0_2_06495648 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06497E20 | 0_2_06497E20 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_0649C220 | 0_2_0649C220 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_0649B2C8 | 0_2_0649B2C8 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06492348 | 0_2_06492348 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06497740 | 0_2_06497740 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_0649E440 | 0_2_0649E440 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06495D98 | 0_2_06495D98 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06490040 | 0_2_06490040 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06581988 | 0_2_06581988 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06581982 | 0_2_06581982 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06490025 | 0_2_06490025 |
Source: lUy4SKlE6A.exe, 00000000.00000002.4558298006.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs lUy4SKlE6A.exe |
Source: lUy4SKlE6A.exe, 00000000.00000002.4557940198.00000000008F9000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs lUy4SKlE6A.exe |
Source: lUy4SKlE6A.exe, 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilename00b93cc8-4625-4c9d-a44d-5996e806c5f9.exe4 vs lUy4SKlE6A.exe |
Source: lUy4SKlE6A.exe | Binary or memory string: OriginalFilename00b93cc8-4625-4c9d-a44d-5996e806c5f9.exe4 vs lUy4SKlE6A.exe |
Source: lUy4SKlE6A.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: lUy4SKlE6A.exe, 4JJG6X.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, 4JJG6X.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, 8C78isHTVco.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, CqSP68Ir.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: lUy4SKlE6A.exe, CqSP68Ir.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027C0C6D push edi; retf | 0_2_027C0C7A |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_027C0C45 push ebx; retf | 0_2_027C0C52 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_065876E0 push esp; iretd | 0_2_065876E9 |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Code function: 0_2_06587CA4 push esp; iretd | 0_2_06587CAD |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -27670116110564310s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -100000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 2748 | Thread sleep count: 7539 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 2748 | Thread sleep count: 2318 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -99210s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98875s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98633s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98531s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98421s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98312s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98203s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -98093s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97984s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97875s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97766s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97641s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97531s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97422s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97312s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97203s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -97094s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96983s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96875s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96765s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96656s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96547s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96437s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96328s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96219s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96109s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -96000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95890s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95781s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95672s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95562s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95453s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95344s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95234s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95125s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -95015s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94906s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94797s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94687s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94578s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94469s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94359s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe TID: 5580 | Thread sleep time: -94250s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 100000 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99890 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99781 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99672 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99562 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99453 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99328 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 99210 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98875 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98633 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98531 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98421 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98312 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98203 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 98093 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97984 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97875 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97766 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97641 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97531 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97422 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97312 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97203 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 97094 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96983 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96875 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96765 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96656 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96547 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96437 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96328 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96219 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96109 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 96000 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95890 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95781 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95672 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95562 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95453 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95344 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95234 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95125 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 95015 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94906 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94797 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94687 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94578 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94469 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94359 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Thread delayed: delay time: 94250 | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Users\user\Desktop\lUy4SKlE6A.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: lUy4SKlE6A.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\lUy4SKlE6A.exe | Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities | Jump to behavior |
Source: Yara match | File source: lUy4SKlE6A.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR |
Source: Yara match | File source: lUy4SKlE6A.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.lUy4SKlE6A.exe.470000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.2109413372.0000000000472000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4559214626.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: lUy4SKlE6A.exe PID: 3548, type: MEMORYSTR |