Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.000000000165C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.3347288009.000000000165C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015EE000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.3347288009.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.3047079705.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.2747266956.000000000160C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/ |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/)x |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/- |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/4 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.3047079705.000000000160C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/; |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/? |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080/l |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:80802.40 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xscapezo.capetown:8080on3Microsoft |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xweb.ddns.net:8080 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xweb.ddns.net:80806WinHttp.WinHttpRequest.5.16WinHttp.WinHttpRequest.5.16WinHttp.WinHttpReque |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://xweb.ddns.net:80807http://xscapezo.capetown:8080 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1887742930.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541594269.00000000015AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkip.amazonaws.com/ |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1869312955.0000000001612000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/ |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1869312955.0000000001612000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/country |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1869312955.0000000001612000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/countryt |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1887742930.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1887871602.0000000001611000.00000004.00000020.00020000.00000000.sdmp, 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1869312955.0000000001612000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/countryxSd |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000003.1887742930.00000000015F0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io:443/country443/ |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00159029 | 0_2_00159029 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0016587C | 0_2_0016587C |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00168129 | 0_2_00168129 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001583A5 | 0_2_001583A5 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00159CAD | 0_2_00159CAD |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00164CD7 | 0_2_00164CD7 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015AF50 | 0_2_0015AF50 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015E078 | 0_2_0015E078 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001660C9 | 0_2_001660C9 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015AA69 | 0_2_0015AA69 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001714D0 | 0_2_001714D0 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015ED20 | 0_2_0015ED20 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0016B610 | 0_2_0016B610 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0016CE7D | 0_2_0016CE7D |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015F6B7 | 0_2_0015F6B7 |
Source: unknown | Process created: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe "C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe" | |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic os get Name | |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get name | |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic path win32_VideoController get name | |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic os get Name | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get name | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Process created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic path win32_VideoController get name | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: winhttpcom.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: msxml6.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\wbem\WMIC.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0016587C push esi; mov dword ptr [esp], 0017C140h | 0_2_0016573B |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00164CD7 push edx; mov dword ptr [esp], eax | 0_2_00165486 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00164CD7 push ecx; mov dword ptr [esp], eax | 0_2_00165493 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00154831 push edx; mov dword ptr [esp], 0017C140h | 0_2_00154869 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00156029 push edx; mov dword ptr [esp], edi | 0_2_0015604A |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00156029 push edi; mov dword ptr [esp], 0017C140h | 0_2_00156078 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001660C9 push esi; mov dword ptr [esp], 0017C140h | 0_2_0016573B |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00156150 push eax; mov dword ptr [esp], 0017C140h | 0_2_0015617F |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00184273 push esp; ret | 0_2_0018427A |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015AA69 push ecx; mov dword ptr [esp], 00000000h | 0_2_0015AC11 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015AA69 push eax; mov dword ptr [esp], edi | 0_2_0015AC5A |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0018031B push D1DD3004h; retf | 0_2_00180320 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00183B03 pushad ; ret | 0_2_00183B0A |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001663DF push esi; mov dword ptr [esp], 0017C140h | 0_2_0016573B |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00183CB0 push ecx; ret | 0_2_00183CDA |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001844F1 push es; ret | 0_2_001844F4 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001574EF push eax; mov dword ptr [esp], 0017C140h | 0_2_00157521 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015BD1C push ebx; mov dword ptr [esp], 0017C140h | 0_2_0015BD5A |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015A508 push edx; mov dword ptr [esp], 0017C140h | 0_2_0015A555 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00183D39 push edi; ret | 0_2_00183D44 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0018252F push edx; ret | 0_2_00182536 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015754B push eax; mov dword ptr [esp], 0017C140h | 0_2_00157588 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001665BC push esi; mov dword ptr [esp], 0017C140h | 0_2_0016573B |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0018469A push ecx; ret | 0_2_0018469B |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015A6B5 push eax; mov dword ptr [esp], 0017C140h | 0_2_0015A6EB |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00156F34 push eax; mov dword ptr [esp], 0017C140h | 0_2_00156F85 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_0015BF56 push ebx; mov dword ptr [esp], 0017C140h | 0_2_0015BF84 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00156FB3 push eax; mov dword ptr [esp], 0017C140h | 0_2_00156FF5 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROCMON.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: REGMON.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXEP |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE0!I |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: WINDBG.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: IMPORTREC.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: PROC_ANALYZER.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SNIFF_HIT.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: FIDDLER.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: SYSANALYZER.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_001728AE RemoveVectoredExceptionHandler,AddVectoredExceptionHandler,RtlAddVectoredExceptionHandler,TlsGetValue,CloseHandle,CloseHandle,TlsSetValue,CloseHandle,CloseHandle,TlsSetValue,CloseHandle, | 0_2_001728AE |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00151148 GetStartupInfoA,_amsg_exit,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit, | 0_2_00151148 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00151189 _amsg_exit,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit, | 0_2_00151189 |
Source: C:\Users\user\Desktop\1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe | Code function: 0_2_00151207 _initterm,_initterm,SetUnhandledExceptionFilter,__p__acmdln,__initenv,exit,_cexit, | 0_2_00151207 |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: procmon.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: tcpview.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: wireshark.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: lordpe.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: procexp.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: autoruns.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: ollydbg.exe |
Source: 1734347766284d20dc9a2ac535c59f41881efe888891552ad79abf01710e07a6dadfae2b13366.dat-decoded.exe, 00000000.00000002.3541491548.0000000001490000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: regmon.exe |