Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004257E0 GetConsoleProcessList,CharUpperA,CharToOemBuffA,CharToOemBuffA,GetConsoleProcessList,WriteProfileStringW,RegisterClassA,SetThreadContext,GetFileAttributesExA,_fputc,GetConsoleAliasW,WriteConsoleOutputCharacterA,GetFileType,GetConsoleAliasW,WriteConsoleOutputCharacterA,GetFileType,GlobalAlloc,GetWindowsDirectoryW,SetThreadAffinityMask,SetProcessShutdownParameters,GetWindowsDirectoryW,SetThreadAffinityMask,ReadConsoleOutputCharacterA,SetProcessShutdownParameters,BuildCommDCBAndTimeoutsW,GetVolumeInformationW,GetConsoleAliasA,SetProcessShutdownParameters,GetPrivateProfileStringW,GetPrivateProfileStringW,AddAtomA,GetSystemWindowsDirectoryW,DisconnectNamedPipe,AddAtomA,GetSystemWindowsDirectoryW,DisconnectNamedPipe,GetConsoleCursorInfo,VirtualProtect,InterlockedDecrement,GetCharWidthFloatW,ClearEventLogA,InterlockedDecrement,GetCharWidthFloatW,ClearEventLogA,GlobalUnfix,OpenWaitableTimerW,GlobalFlags,LocalFlags,LoadLibraryW,GetConsoleCursorInfo,SetConsoleCP,TerminateProcess,FindFirstFileA,InterlockedIncrement,GetVolumeNameForVolumeMountPointA,GetModuleHandleW,CreateActCtxA,_lclose,ReadConsoleW,GetNamedPipeHandleStateW,GetModuleHandleA,CreateEventA,ExpandEnvironmentStringsW,SetProcessAffinityMask,SetTimeZoneInformation,ActivateActCtx,DeleteVolumeMountPointA, | 0_2_004257E0 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_0042545B WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_0042545B |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00425400 WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_00425400 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255C0 DisconnectNamedPipe,AddAtomA,GetSystemWindowsDirectoryW,ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255C0 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255F6 ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255F6 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255F4 ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255F4 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00425659 WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_00425659 |
Source: explorer.exe, 00000003.00000000.1567258720.000000000955E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0 |
Source: explorer.exe, 00000003.00000000.1567258720.000000000955E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 |
Source: explorer.exe, 00000003.00000000.1567258720.0000000009519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.000000000955E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.0000000009519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0 |
Source: explorer.exe, 00000003.00000002.2732849760.000000000DFA0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2159062286.000000000D54C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2733305074.0000000010400000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2159452142.000000000D47A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://host-file-host6.com/ |
Source: explorer.exe, 00000003.00000003.2159062286.000000000D54C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://host-file-host6.com/tingsTU; |
Source: explorer.exe, 00000003.00000003.2160992593.000000000D072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2159452142.000000000D47A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D47A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2160168941.000000000D046000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://iwtkhvgidl.com/ |
Source: explorer.exe, 00000003.00000003.2160992593.000000000D072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2160168941.000000000D046000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://iwtkhvgidl.com/application/x-www-form-urlencodedMozilla/5.0 |
Source: explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2159452142.000000000D47A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://lrvsgmets.com/ |
Source: explorer.exe, 00000003.00000003.2159062286.000000000D54C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://lrvsgmets.com/ings#U |
Source: explorer.exe, 00000003.00000000.1567258720.000000000955E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: explorer.exe, 00000003.00000003.2160246624.000000000305D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2725144997.000000000305D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1560749669.000000000305D000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di |
Source: explorer.exe, 00000003.00000002.2727383323.0000000007B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.2724814325.0000000002C00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.2727361366.0000000007AF0000.00000002.00000001.00040000.00000000.sdmp | String found in binary or memory: http://schemas.micro |
Source: explorer.exe, 00000003.00000003.2158520711.000000000D47A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://ubpctscp.net/ |
Source: explorer.exe, 00000003.00000000.1569386783.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D1D5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D1D8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppin |
Source: explorer.exe, 00000003.00000003.2159452142.000000000D1F9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1569386783.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D1D5000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://android.notify.windows.com/iOS |
Source: explorer.exe, 00000003.00000002.2728248249.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/$ |
Source: explorer.exe, 00000003.00000002.2728248249.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/X |
Source: explorer.exe, 00000003.00000000.1560749669.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2723738796.0000000000889000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1559516725.0000000000889000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2160246624.0000000002FBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2725144997.0000000002FC0000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind |
Source: explorer.exe, 00000003.00000002.2728248249.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows? |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=C2BB6DDCE8D847D6B779FE8AEC27D161&timeOut=5000&oc |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1560749669.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2725120474.0000000002FAE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2160909018.0000000002FAD000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows? |
Source: explorer.exe, 00000003.00000002.2728248249.0000000009390000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.0000000009390000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://arc.msn.comWzE |
Source: explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings |
Source: explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark |
Source: explorer.exe, 00000003.00000000.1569386783.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D1D5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D1D8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://excel.office.comE |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15G9PH.img |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hJkDs.img |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img |
Source: explorer.exe, 00000003.00000000.1569386783.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D1D5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D1D8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://outlook.comNaP0B |
Source: explorer.exe, 00000003.00000000.1569386783.000000000CFF4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D073000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2159155796.000000000D0B8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://powerpoint.office.comcemberZ |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew |
Source: explorer.exe, 00000003.00000002.2729091529.0000000009730000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567932050.0000000009730000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://wns.windows.com/bat |
Source: explorer.exe, 00000003.00000000.1569386783.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2158520711.000000000D1D5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2731587157.000000000D1D8000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://word.office.com576 |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/health/wellness/7-secrets-to-a-happy-old-age-backed-by-science/ss-AA1hwpvW |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/companies/legacy-park-auction-canceled-liquidation-proposed-here-s-w |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-years |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in- |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/crime/one-dead-several-wounded-after-drive-by-shootings-in-south-la/a |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/opinion/decline-of-decorum-21-essential-manners-today-s-parents-fail- |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/politics/california-workers-will-get-five-sick-days-instead-of-three- |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controv |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact- |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve |
Source: explorer.exe, 00000003.00000002.2726467310.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: https://www.msn.com:443/en-us/feed |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00930110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, | 0_2_00930110 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_0040180C Sleep,NtTerminateProcess, | 2_2_0040180C |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_00401818 Sleep,NtTerminateProcess, | 2_2_00401818 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_00401822 Sleep,NtTerminateProcess, | 2_2_00401822 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_00401826 Sleep,NtTerminateProcess, | 2_2_00401826 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_00401834 Sleep,NtTerminateProcess, | 2_2_00401834 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_00860110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess, | 5_2_00860110 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_0040180C Sleep,NtTerminateProcess, | 6_2_0040180C |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_00401818 Sleep,NtTerminateProcess, | 6_2_00401818 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_00401822 Sleep,NtTerminateProcess, | 6_2_00401822 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_00401826 Sleep,NtTerminateProcess, | 6_2_00401826 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_00401834 Sleep,NtTerminateProcess, | 6_2_00401834 |
Source: 00000006.00000002.1863904346.0000000001F61000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000002.00000002.1577083390.0000000002341000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000006.00000002.1863662169.0000000000500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000005.00000002.1813482069.000000000098C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.1511973932.0000000000ABD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000003.00000002.2727880328.00000000083F1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000003.00000002.2724026531.0000000000B31000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: 00000002.00000002.1576706084.0000000000540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: zj\ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: GhB | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: T(7a | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: 9X"e | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: Kn6B | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: Wqu | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: QMrQ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: JG__ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: qu|a | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: ~=l@ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: a*oJ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: =)W{ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: 35e | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: $iEz | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: X!pq | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: gew | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: ogr( | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: o%HQ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: \Sj= | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: WTE | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: [l1h | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: fPT | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: |59M | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: O2l[ | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: k'Z# | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: hRjT | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: msX? | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: c<z | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: `*T | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Command line argument: Yx@t | 0_2_00425D20 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00408569 push ecx; ret | 0_2_0040857C |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_0040B375 push ecx; ret | 0_2_0040B388 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_0093198B push ebx; iretd | 0_2_009319B7 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00931970 push ebx; iretd | 0_2_009319B7 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00931977 push ebx; iretd | 0_2_009319B7 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00AC901F pushad ; iretd | 0_2_00AC9025 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00AC4193 push ebx; iretd | 0_2_00AC41BE |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00AC417E push ebx; iretd | 0_2_00AC41BE |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_004011D0 push ebx; iretd | 2_2_00401217 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_004011D7 push ebx; iretd | 2_2_00401217 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 2_2_004011EB push ebx; iretd | 2_2_00401217 |
Source: C:\Windows\explorer.exe | Code function: 3_2_00B31178 push 00000015h; ret | 3_2_00B3117A |
Source: C:\Windows\explorer.exe | Code function: 3_2_083F1178 push 00000015h; ret | 3_2_083F117A |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_0086198B push ebx; iretd | 5_2_008619B7 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_00861977 push ebx; iretd | 5_2_008619B7 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_00861970 push ebx; iretd | 5_2_008619B7 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_009981DF pushad ; iretd | 5_2_009981E5 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_0099333E push ebx; iretd | 5_2_0099337E |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 5_2_00993353 push ebx; iretd | 5_2_0099337E |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_004011D0 push ebx; iretd | 6_2_00401217 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_004011D7 push ebx; iretd | 6_2_00401217 |
Source: C:\Users\user\AppData\Roaming\hdeufvw | Code function: 6_2_004011EB push ebx; iretd | 6_2_00401217 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004257E0 GetConsoleProcessList,CharUpperA,CharToOemBuffA,CharToOemBuffA,GetConsoleProcessList,WriteProfileStringW,RegisterClassA,SetThreadContext,GetFileAttributesExA,_fputc,GetConsoleAliasW,WriteConsoleOutputCharacterA,GetFileType,GetConsoleAliasW,WriteConsoleOutputCharacterA,GetFileType,GlobalAlloc,GetWindowsDirectoryW,SetThreadAffinityMask,SetProcessShutdownParameters,GetWindowsDirectoryW,SetThreadAffinityMask,ReadConsoleOutputCharacterA,SetProcessShutdownParameters,BuildCommDCBAndTimeoutsW,GetVolumeInformationW,GetConsoleAliasA,SetProcessShutdownParameters,GetPrivateProfileStringW,GetPrivateProfileStringW,AddAtomA,GetSystemWindowsDirectoryW,DisconnectNamedPipe,AddAtomA,GetSystemWindowsDirectoryW,DisconnectNamedPipe,GetConsoleCursorInfo,VirtualProtect,InterlockedDecrement,GetCharWidthFloatW,ClearEventLogA,InterlockedDecrement,GetCharWidthFloatW,ClearEventLogA,GlobalUnfix,OpenWaitableTimerW,GlobalFlags,LocalFlags,LoadLibraryW,GetConsoleCursorInfo,SetConsoleCP,TerminateProcess,FindFirstFileA,InterlockedIncrement,GetVolumeNameForVolumeMountPointA,GetModuleHandleW,CreateActCtxA,_lclose,ReadConsoleW,GetNamedPipeHandleStateW,GetModuleHandleA,CreateEventA,ExpandEnvironmentStringsW,SetProcessAffinityMask,SetTimeZoneInformation,ActivateActCtx,DeleteVolumeMountPointA, | 0_2_004257E0 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_0042545B WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_0042545B |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00425400 WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_00425400 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255C0 DisconnectNamedPipe,AddAtomA,GetSystemWindowsDirectoryW,ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255C0 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255F6 ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255F6 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_004255F4 ReadConsoleInputA,WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_004255F4 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: 0_2_00425659 WriteConsoleInputW,GlobalGetAtomNameA,GetCommandLineW,MoveFileWithProgressA,FindFirstFileW, | 0_2_00425659 |
Source: explorer.exe, 00000003.00000000.1559516725.0000000000889000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000/; |
Source: explorer.exe, 00000003.00000000.1559516725.0000000000889000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000o; |
Source: explorer.exe, 00000003.00000000.1567932050.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000 |
Source: explorer.exe, 00000003.00000000.1567932050.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 1efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000003.00000000.1567258720.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: explorer.exe, 00000003.00000000.1567932050.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: NXTbrVMWare |
Source: explorer.exe, 00000003.00000000.1567932050.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}? |
Source: explorer.exe, 00000003.00000002.2728248249.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1567258720.000000000952D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000003.00000000.1567258720.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: explorer.exe, 00000003.00000000.1567258720.00000000093B4000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: 2VMware Virtual USB MouseJC:\Windows\System32\DDORes.dll,-2212 |
Source: explorer.exe, 00000003.00000002.2728248249.00000000094DC000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: %SystemRoot%\system32\mswsock.dlldRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000 |
Source: explorer.exe, 00000003.00000000.1567932050.00000000095B9000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b} |
Source: explorer.exe, 00000003.00000000.1562010966.0000000006F94000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000 |
Source: explorer.exe, 00000003.00000002.2725144997.0000000002FC0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, | 0_2_0040E45D |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 0_2_0040E8D8 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, | 0_2_0040ECA0 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: _GetPrimaryLen,EnumSystemLocalesA, | 0_2_0040ED60 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, | 0_2_0040E16F |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, | 0_2_0040D513 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: GetLocaleInfoA, | 0_2_0040AD2F |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, | 0_2_004095C4 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: _GetPrimaryLen,EnumSystemLocalesA, | 0_2_0040EDC7 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, | 0_2_0040E9CD |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: GetLocaleInfoW,_GetPrimaryLen, | 0_2_0040EA74 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA, | 0_2_0040EE03 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_TestDefaultLanguage, | 0_2_0040EACF |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp, | 0_2_00411EDD |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, | 0_2_00411B1D |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, | 0_2_00411BF7 |
Source: C:\Users\user\Desktop\e6reA52T4I.exe | Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, | 0_2_0040BBBA |