Source: |
Binary string: System.ServiceModel.pdbbb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbe source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028D7000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028D7000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb0\ equals www.youtube.com (Youtube) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028D7000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldbP, equals www.youtube.com (Youtube) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028D7000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028D7000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb0\ equals www.youtube.com (Youtube) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyl |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/8) |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/ |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1ResponseXx |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2ResponseXx |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A07000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.000000000293F000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000029BB000.00000004.00000800.00020000.00000000.sdmp, 1iYCBTo5tf.exe, 00000001.00000002.3724770666.0000000002A4A000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3ResponseXx |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028BC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.s0 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028BC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ip |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028BC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ip0 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724770666.00000000028BC000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ipP |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA67E0 |
1_2_04EA67E0 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA2700 |
1_2_04EA2700 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA92E8 |
1_2_04EA92E8 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA1F92 |
1_2_04EA1F92 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EAC248 |
1_2_04EAC248 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EAC258 |
1_2_04EAC258 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA67E0 |
1_2_04EA67E0 |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Code function: 1_2_04EA67E0 |
1_2_04EA67E0 |
Source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000C5E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs 1iYCBTo5tf.exe |
Source: 1iYCBTo5tf.exe, 00000001.00000000.2471985280.0000000000552000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamePutz.exe" vs 1iYCBTo5tf.exe |
Source: 1iYCBTo5tf.exe |
Binary or memory string: OriginalFilenamePutz.exe" vs 1iYCBTo5tf.exe |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: |
Binary string: System.ServiceModel.pdbbb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbe source: 1iYCBTo5tf.exe, 00000001.00000002.3724194895.0000000000D32000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: 1iYCBTo5tf.exe, 00000001.00000002.3725963625.00000000050F0000.00000004.00000020.00020000.00000000.sdmp |
Source: 1iYCBTo5tf.exe, TTmEWhqQy8Sta6FEMu.cs |
High entropy of concatenated method names: 'acyXjuTJ5', 'E8sSpQDy9', 'fHBMYaca3', 'HIl3HqZ3u', 'ILpaFTW9N', 'KeekH7pVM', 'BXBTut9OB', 'TNBgMmXfx', 'FPx4aLUO9', 'moUzdrNxj' |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Users\user\Desktop\1iYCBTo5tf.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\1iYCBTo5tf.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: 1iYCBTo5tf.exe, type: SAMPLE |
Source: Yara match |
File source: 1.0.1iYCBTo5tf.exe.550000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000000.2471985280.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 1iYCBTo5tf.exe PID: 6336, type: MEMORYSTR |
Source: Yara match |
File source: 1iYCBTo5tf.exe, type: SAMPLE |
Source: Yara match |
File source: 1.0.1iYCBTo5tf.exe.550000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000000.2471985280.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 1iYCBTo5tf.exe PID: 6336, type: MEMORYSTR |