Click to jump to signature section
Source: | Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.00000000008F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000099F000.00000004.00000020.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2531268430.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000096B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000096B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbC source: odo7jrvnU3.exe, 00000005.00000002.2531268430.0000000004BC0000.00000004.00000020.00020000.00000000.sdmp |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown | TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002537000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002537000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002537000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`, equals www.youtube.com (Youtube) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002537000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002537000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyl |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/8) |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/ |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1LR |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1ResponseXx |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2LR |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2ResponseXx |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3LR |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026AA000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000261B000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000272E000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.000000000259F000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000026EC000.00000004.00000800.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2530216022.0000000002667000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3ResponseXx |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000024E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.s |
Source: odo7jrvnU3.exe, 00000005.00000002.2530216022.00000000024E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/ip |
Source: odo7jrvnU3.exe, 00000005.00000000.1273548797.00000000000D2000.00000002.00000001.01000000.00000004.sdmp | Binary or memory string: OriginalFilenamePutz.exe" vs odo7jrvnU3.exe |
Source: odo7jrvnU3.exe, 00000005.00000002.2529785055.00000000008BE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs odo7jrvnU3.exe |
Source: odo7jrvnU3.exe | Binary or memory string: OriginalFilenamePutz.exe" vs odo7jrvnU3.exe |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: | Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.00000000008F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000099F000.00000004.00000020.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2531268430.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp, odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000096B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: odo7jrvnU3.exe, 00000005.00000002.2529785055.000000000096B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbC source: odo7jrvnU3.exe, 00000005.00000002.2531268430.0000000004BC0000.00000004.00000020.00020000.00000000.sdmp |
Source: odo7jrvnU3.exe, TTmEWhqQy8Sta6FEMu.cs | High entropy of concatenated method names: 'acyXjuTJ5', 'E8sSpQDy9', 'fHBMYaca3', 'HIl3HqZ3u', 'ILpaFTW9N', 'KeekH7pVM', 'BXBTut9OB', 'TNBgMmXfx', 'FPx4aLUO9', 'moUzdrNxj' |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Users\user\Desktop\odo7jrvnU3.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\odo7jrvnU3.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: odo7jrvnU3.exe, type: SAMPLE |
Source: Yara match | File source: 5.0.odo7jrvnU3.exe.d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000000.1273548797.00000000000D2000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: odo7jrvnU3.exe PID: 8012, type: MEMORYSTR |
Source: Yara match | File source: odo7jrvnU3.exe, type: SAMPLE |
Source: Yara match | File source: 5.0.odo7jrvnU3.exe.d0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000005.00000000.1273548797.00000000000D2000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: odo7jrvnU3.exe PID: 8012, type: MEMORYSTR |