Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: reinforcenh.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: stogeneratmns.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: fragnantbui.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: drawzhotdog.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: vozmeatillu.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: offensivedzvju.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: ghostreedmnu.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: gutterydhowi.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: drawzhotdog.shop |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: TeslaBrowser/5.5 |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: - Screen Resoluton: |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: - Physical Installed Memory: |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: Workgroup: - |
Source: 00000002.00000002.1748977401.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: TBnDlH-- |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+24h] | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+08h] | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-10h] | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-10h] | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-1Ch] | 2_2_0040E9C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov dword ptr [esp], 00000000h | 2_2_0041A040 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then movzx ebx, byte ptr [edi+edx] | 2_2_00401000 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 2_2_00443010 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, ebp | 2_2_0040A0C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, ebp | 2_2_0040A0C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [edx], cl | 2_2_00431167 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+0Ch] | 2_2_00431167 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+0Ch] | 2_2_00431167 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [edi], al | 2_2_00431167 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+44h] | 2_2_0041D1CC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 54CA534Eh | 2_2_004472C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+08h] | 2_2_004153E5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+08h] | 2_2_004153E5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 2_2_0043A3F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [edi], al | 2_2_004313A6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [edx], al | 2_2_004313A6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh | 2_2_00443460 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then jmp eax | 2_2_0042D46E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+08h] | 2_2_0041447C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then movzx ecx, word ptr [edi+eax] | 2_2_004474C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp word ptr [eax+esi+02h], 0000h | 2_2_0042D4B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 2_2_0042F530 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+00000874h] | 2_2_00428581 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov word ptr [edx], ax | 2_2_00428581 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh | 2_2_00444590 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 2_2_00445643 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then movzx edx, byte ptr [esi+ebx] | 2_2_00405680 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 2_2_00410690 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 2_2_00410690 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+0Ch] | 2_2_00449700 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h | 2_2_00449700 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-14h] | 2_2_004487D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov dword ptr [esp+14h], 12EEEC16h | 2_2_0042E7F6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+04h] | 2_2_004278E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov word ptr [eax], cx | 2_2_004278E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [ebp-10h] | 2_2_004278E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+0Ch] | 2_2_00449890 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h | 2_2_00449890 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah | 2_2_00449A10 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+0Ch] | 2_2_00431AC3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+0Ch] | 2_2_00431AC3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi+000006A8h] | 2_2_0041DACA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 2_2_0040DBF0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then xor eax, eax | 2_2_0042ABF9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp] | 2_2_00443B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh | 2_2_00443B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esp+08h] | 2_2_00414C30 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh | 2_2_00447D70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then movzx eax, word ptr [esi+ecx] | 2_2_00440D00 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp byte ptr [edi+eax+01h], 00000000h | 2_2_0042CD08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then jmp eax | 2_2_0042CD08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then cmp byte ptr [esi+ebx], 00000000h | 2_2_0042FD10 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov word ptr [eax], dx | 2_2_0041FD80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then jmp dword ptr [00450078h] | 2_2_0041FD80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [ebx], al | 2_2_00411DAE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov eax, dword ptr [esi] | 2_2_00411DAE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov byte ptr [edi], al | 2_2_00411DAE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 4x nop then mov word ptr [eax], cx | 2_2_00425EF0 |
Source: Network traffic | Suricata IDS: 2056160 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop) : 192.168.2.4:55012 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056162 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop) : 192.168.2.4:55062 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056154 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop) : 192.168.2.4:63286 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056150 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop) : 192.168.2.4:62664 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056156 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop) : 192.168.2.4:58593 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.4:57209 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056152 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop) : 192.168.2.4:54960 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2056158 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop) : 192.168.2.4:50006 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49730 -> 23.55.153.106:443 |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: RegAsm.exe, 00000002.00000002.1749381476.0000000001388000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/3 |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: RegAsm.exe, 00000002.00000002.1749217999.000000000135D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: RegAsm.exe, 00000002.00000002.1749451185.00000000013AB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040F870 | 2_2_0040F870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00401000 | 2_2_00401000 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040A0C0 | 2_2_0040A0C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040E080 | 2_2_0040E080 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00415081 | 2_2_00415081 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040B150 | 2_2_0040B150 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00431167 | 2_2_00431167 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0044A120 | 2_2_0044A120 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00409269 | 2_2_00409269 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0043F2AC | 2_2_0043F2AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004362B0 | 2_2_004362B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00401379 | 2_2_00401379 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004483F0 | 2_2_004483F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004013BC | 2_2_004013BC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00409442 | 2_2_00409442 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042D4B0 | 2_2_0042D4B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00436560 | 2_2_00436560 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042F5D0 | 2_2_0042F5D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004015DE | 2_2_004015DE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042C5E3 | 2_2_0042C5E3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00428581 | 2_2_00428581 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00403660 | 2_2_00403660 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00410690 | 2_2_00410690 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004487D0 | 2_2_004487D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00447870 | 2_2_00447870 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_004378C0 | 2_2_004378C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00407900 | 2_2_00407900 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040C9D0 | 2_2_0040C9D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0041DACA | 2_2_0041DACA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00406B60 | 2_2_00406B60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00437B70 | 2_2_00437B70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042CB0F | 2_2_0042CB0F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042ABF9 | 2_2_0042ABF9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00443B90 | 2_2_00443B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040BC60 | 2_2_0040BC60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0040ACC0 | 2_2_0040ACC0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00426D6F | 2_2_00426D6F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00447D70 | 2_2_00447D70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0042CD08 | 2_2_0042CD08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00412D20 | 2_2_00412D20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00404DB0 | 2_2_00404DB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00449E50 | 2_2_00449E50 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00413E12 | 2_2_00413E12 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00410ED0 | 2_2_00410ED0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_0043DF50 | 2_2_0043DF50 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00406F00 | 2_2_00406F00 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 2_2_00408FCE | 2_2_00408FCE |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\cccc2.exe | Code function: 0_2_033A212D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread, | 0_2_033A212D |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: reinforcenh.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: stogeneratmns.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: fragnantbui.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: drawzhotdog.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: vozmeatillu.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: offensivedzvju.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: ghostreedmnu.shop |
Source: cccc2.exe, 00000000.00000002.1705304601.00000000043A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: gutterydhowi.shop |