Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | TCP traffic detected without corresponding DNS query: 208.115.220.58 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: RegAsm.exe, 0000000E.00000002.2633955559.0000000005930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0 |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0# |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: RegAsm.exe, 0000000E.00000002.2629872593.0000000001807000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: RegAsm.exe, 0000000E.00000002.2633955559.0000000005930000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.14.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.io/ip |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://james.newtonking.com/projects/json |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://ocsp.sectigo.com0D |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: RegAsm.exe, 0000000E.00000002.2630405640.0000000003421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: Depression.com, 0000000B.00000000.1425868665.00000000010D5000.00000002.00000001.01000000.00000007.sdmp, Managed.0.dr, Depression.com.2.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/X |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: http://www.newtonsoft.com/jsonschema |
Source: OR8Ti8rf8h.exe | String found in binary or memory: http://www.softland.ro0/ |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5 |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://discordapp.com/api/v6/users/ |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://github.com/LimerBoy/StormKitty |
Source: OR8Ti8rf8h.exe | String found in binary or memory: https://sectigo.com/CPS0 |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354cIt |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://urn.to/r/sds_see |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://urn.to/r/sds_seeaCould |
Source: Depression.com.2.dr, Ada.0.dr | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: Ada.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Viruses entropy: 7.99822982573 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\False entropy: 7.99689272878 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Regardless entropy: 7.99715475135 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Phrase entropy: 7.99741027527 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Proudly entropy: 7.99707385539 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Experience entropy: 7.9972652898 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Reserve entropy: 7.99724135879 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Needle entropy: 7.99777189205 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Mary entropy: 7.99775540186 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Disturbed entropy: 7.99676919368 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Turned entropy: 7.99721220613 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Solaris entropy: 7.99769657464 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Consecutive entropy: 7.99685491078 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Confident entropy: 7.99774835652 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Pipes entropy: 7.99732276667 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Fees entropy: 7.99803927966 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Movers entropy: 7.9975454896 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Ribbon entropy: 7.99772369059 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Include entropy: 7.99824280401 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Reed entropy: 7.9970905642 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Alumni entropy: 7.99782896822 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Hollow entropy: 7.99685426093 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Assume entropy: 7.99763847749 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Wallpapers entropy: 7.99799189457 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Specialist entropy: 7.99728573595 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Scottish entropy: 7.9980673954 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Reflected entropy: 7.99680752846 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Respondent entropy: 7.99841111859 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Crm entropy: 7.99834438399 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Spelling entropy: 7.99753094835 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Harassment entropy: 7.99810730566 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Usc entropy: 7.99792599778 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Tft entropy: 7.99754854098 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Specialties entropy: 7.99641949893 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Holocaust entropy: 7.99842487997 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Started entropy: 7.9971176372 | Jump to dropped file |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | File created: C:\Users\user\AppData\Local\Temp\Angle entropy: 7.99700636245 | Jump to dropped file |
Source: C:\Windows\SysWOW64\cmd.exe | File created: C:\Users\user\AppData\Local\Temp\585711\Y entropy: 7.99993092407 | Jump to dropped file |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | File created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 entropy: 7.99661776995 | Jump to dropped file |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects StormKitty infostealer Author: ditekSHen |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: Process Memory Space: RegAsm.exe PID: 6180, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: RegAsm.exe PID: 6180, type: MEMORYSTR | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 14.2.RegAsm.exe.1295b8a.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty |
Source: 14.2.RegAsm.exe.1170000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Process Memory Space: RegAsm.exe PID: 6180, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: RegAsm.exe PID: 6180, type: MEMORYSTR | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: unknown | Process created: C:\Users\user\Desktop\OR8Ti8rf8h.exe "C:\Users\user\Desktop\OR8Ti8rf8h.exe" | |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Frames Frames.cmd && Frames.cmd | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 585711 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ComplyFailuresGuardsDomInvolvementRadarScreensKidney" Tonight | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Solaris + ..\Harassment + ..\Proudly + ..\Turned + ..\Viruses + ..\Wallpapers + ..\Usc + ..\Crm + ..\Ribbon + ..\Confident + ..\Angle + ..\Alumni + ..\Fees + ..\Reserve + ..\Reflected + ..\Include + ..\Specialist + ..\Respondent + ..\False + ..\Assume + ..\Regardless + ..\Mary + ..\Consecutive + ..\Movers + ..\Scottish + ..\Holocaust + ..\Experience + ..\Phrase + ..\Started + ..\Disturbed + ..\Needle + ..\Pipes + ..\Hollow + ..\Spelling + ..\Reed + ..\Tft + ..\Specialties Y | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\585711\Depression.com Depression.com Y | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Process created: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Frames Frames.cmd && Frames.cmd | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c md 585711 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\findstr.exe findstr /V "ComplyFailuresGuardsDomInvolvementRadarScreensKidney" Tonight | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Solaris + ..\Harassment + ..\Proudly + ..\Turned + ..\Viruses + ..\Wallpapers + ..\Usc + ..\Crm + ..\Ribbon + ..\Confident + ..\Angle + ..\Alumni + ..\Fees + ..\Reserve + ..\Reflected + ..\Include + ..\Specialist + ..\Respondent + ..\False + ..\Assume + ..\Regardless + ..\Mary + ..\Consecutive + ..\Movers + ..\Scottish + ..\Holocaust + ..\Experience + ..\Phrase + ..\Started + ..\Disturbed + ..\Needle + ..\Pipes + ..\Hollow + ..\Spelling + ..\Reed + ..\Tft + ..\Specialties Y | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\585711\Depression.com Depression.com Y | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Process created: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: cryptnet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: devenum.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OR8Ti8rf8h.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\Depression.com | Process information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\585711\RegAsm.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: Depression.com, 0000000B.00000000.1425761430.00000000010C3000.00000002.00000001.01000000.00000007.sdmp, Managed.0.dr, Depression.com.2.dr | Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning |
Source: RegAsm.exe, 0000000E.00000002.2630405640.000000000373B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.00000000035F2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.000000000371B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Program Manager |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: ProgMan |
Source: RegAsm.exe, 0000000E.00000002.2629293985.0000000001172000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: Shell_TrayWnd!SHELLDLL_DefView |
Source: RegAsm.exe, 0000000E.00000002.2630405640.000000000373B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.00000000035F2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.000000000371B000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Program Manager`, |
Source: RegAsm.exe, 0000000E.00000002.2630405640.000000000373B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.000000000371B000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.2630405640.00000000036D5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Program Manager@\ |