Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2941701662.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb53!\~ source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2941701662.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 213.21.220.222 |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.0000000002597000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: $^q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\^q equals www.youtube.com (Youtube) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.0000000002597000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.0000000002597000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\^q equals www.youtube.com (Youtube) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.0000000002597000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`,^q equals www.youtube.com (Youtube) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.0000000002597000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: `,^q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyl |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/8) |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/ |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1LR |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject1ResponseXx |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2 |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2LR |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject2ResponseXx |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3LR |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000025FF000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000274C000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000270A000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000267B000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.00000000026C7000.00000004.00000800.00020000.00000000.sdmp, J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000278E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/RestAPI/TreeObject3ResponseXx |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000257C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.s |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2940710537.000000000257C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ip |
Source: J8Z4q7BJPW.exe, 00000000.00000000.1679739054.00000000000C2000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamePutz.exe" vs J8Z4q7BJPW.exe |
Source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.00000000006FE000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs J8Z4q7BJPW.exe |
Source: J8Z4q7BJPW.exe |
Binary or memory string: OriginalFilenamePutz.exe" vs J8Z4q7BJPW.exe |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2941701662.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb53!\~ source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2939993331.0000000000735000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: J8Z4q7BJPW.exe, 00000000.00000002.2941701662.0000000004BE0000.00000004.00000020.00020000.00000000.sdmp |
Source: J8Z4q7BJPW.exe, TTmEWhqQy8Sta6FEMu.cs |
High entropy of concatenated method names: 'acyXjuTJ5', 'E8sSpQDy9', 'fHBMYaca3', 'HIl3HqZ3u', 'ILpaFTW9N', 'KeekH7pVM', 'BXBTut9OB', 'TNBgMmXfx', 'FPx4aLUO9', 'moUzdrNxj' |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Users\user\Desktop\J8Z4q7BJPW.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\J8Z4q7BJPW.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: J8Z4q7BJPW.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.J8Z4q7BJPW.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1679739054.00000000000C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: J8Z4q7BJPW.exe PID: 7520, type: MEMORYSTR |
Source: Yara match |
File source: J8Z4q7BJPW.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.J8Z4q7BJPW.exe.c0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1679739054.00000000000C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: J8Z4q7BJPW.exe PID: 7520, type: MEMORYSTR |