Click to jump to signature section
Source: | Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000571000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.ServiceModel.pdb^= source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 0SXHP<oHC:\Windows\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349785024.00000000001F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb. source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbN source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.ServiceModel.pdb^ source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.000000000061D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: @Ho.pdbService source: scheduledllama.exe, 00000000.00000002.3349785024.00000000001F7000.00000004.00000010.00020000.00000000.sdmp |
Source: Network traffic | Suricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.6:49707 -> 147.124.222.241:47056 |
Source: Network traffic | Suricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.6:49756 -> 147.124.222.241:47056 |
Source: Network traffic | Suricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.6:49885 -> 147.124.222.241:47056 |
Source: Network traffic | Suricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.6:49820 -> 147.124.222.241:47056 |
Source: Network traffic | Suricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.6:49946 -> 147.124.222.241:47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49756 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49820 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49885 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49946 -> 47056 |
Source: global traffic | HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 147.124.222.241:47056Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 147.124.222.241:47056Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 147.124.222.241:47056Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 147.124.222.241:47056Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 147.124.222.241:47056Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.124.222.241 |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.000000000239F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://147.124.222.241:47056 |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://147.124.222.241:47056/ |
Source: scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023AC000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX |
Source: scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: scheduledllama.exe, 00000000.00000002.3350885953.000000000239F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023AC000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/0 |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/ |
Source: scheduledllama.exe, 00000000.00000002.3350885953.000000000239F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnect |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse |
Source: scheduledllama.exe, 00000000.00000002.3350885953.000000000239F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectT |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR |
Source: scheduledllama.exe, 00000000.00000002.3350885953.00000000023B5000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.0000000002301000.00000004.00000800.00020000.00000000.sdmp, scheduledllama.exe, 00000000.00000002.3350885953.00000000023E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse |
Source: scheduledllama.exe | String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE% |
Source: scheduledllama.exe | String found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg |
Source: scheduledllama.exe | String found in binary or memory: https://ipinfo.io/ip%appdata% |
Source: scheduledllama.exe, type: SAMPLE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: scheduledllama.exe, type: SAMPLE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: Process Memory Space: scheduledllama.exe PID: 2852, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: scheduledllama.exe, 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameImplosions.exe4 vs scheduledllama.exe |
Source: scheduledllama.exe, 00000000.00000002.3349880280.000000000053E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs scheduledllama.exe |
Source: scheduledllama.exe | Binary or memory string: OriginalFilenameImplosions.exe4 vs scheduledllama.exe |
Source: scheduledllama.exe, type: SAMPLE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: scheduledllama.exe, type: SAMPLE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: Process Memory Space: scheduledllama.exe PID: 2852, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: | Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000571000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.ServiceModel.pdb^= source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 0SXHP<oHC:\Windows\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349785024.00000000001F7000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb. source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdbN source: scheduledllama.exe, 00000000.00000002.3349880280.0000000000600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.ServiceModel.pdb^ source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.000000000061D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: scheduledllama.exe, 00000000.00000002.3349880280.00000000005A1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: @Ho.pdbService source: scheduledllama.exe, 00000000.00000002.3349785024.00000000001F7000.00000004.00000010.00020000.00000000.sdmp |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49756 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49820 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49885 -> 47056 |
Source: unknown | Network traffic detected: HTTP traffic on port 49946 -> 47056 |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Users\user\Desktop\scheduledllama.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\scheduledllama.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: scheduledllama.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: scheduledllama.exe PID: 2852, type: MEMORYSTR |
Source: Yara match | File source: scheduledllama.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: scheduledllama.exe PID: 2852, type: MEMORYSTR |
Source: Yara match | File source: scheduledllama.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.scheduledllama.exe.50000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2101277352.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: scheduledllama.exe PID: 2852, type: MEMORYSTR |