Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://127.0.0.1:%d%s?type=m3u8&url=%s&option=%s |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://127.0.0.1:%d%s?type=m3u8&url=%s&option=%shttp://127.0.0.1:%d/titan_pcdn_service/%s?type=%s&ur |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://127.0.0.1:%d/jsond/ping |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://127.0.0.1:%d/titan_pcdn_service/%s?type=%s&url=%s&option=%s |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cdn-hsy-titan-test.ludashi.com/inst_pkgs/ludashi/6.1024.4100.111 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://cdn-hsy-titan-test.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.d |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2134367065.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-hsy-titan-test.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E12000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-hsy-titan-test.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll&ex_ary |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-hsy-titan-test.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll8 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128878207.00000000010D8000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495223849.00000000010D8000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.00000000010A7000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128603827.00000000010B9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-thunder.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-thunder.ludashi.com/pc/appstore/modules/PCStoreSetup_officialwebsite_1.2524.1115.929.dll |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cdn-thunder.ludashi.com/pc/appstore/modules/PCStoreSetup_officialwebsite_1.2524.1115.929.dllC |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://curl.haxx.se/docs/http-cookies.html |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://l.public.ludashi.com/pc/udldslite/dogSunhttp://l.public.ludashi.com/pc/ud/dogsundataerror |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://ocsp.digicert.com0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://pki-ocsp.symauth.com0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://s.ludashi.com/url2?pid= |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.0000000001099000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://s.ludashi.com/url2?pid=buysite_1117&type=xzq&action=down_fail&appver=6.1024.1225.801&modver=6 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E2A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://s.ludashi.com/url2?pid=buysite_1117&type=xzq&action=down_start&appver=6.1024.1225.801&modver= |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.00000000010A7000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E2A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://s.ludashi.com/url2?pid=buysite_1117&type=xzq&action=ldsdownstart&appver=6.1024.1225.801&modve |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2129492013.0000000002DF8000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://s.ludashi.com/url2?pid=buysite_1117&type=xzq&action=run&appver=6.1024.1225.801&modver=6.1024. |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2496789859.000000000101D000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://softmgr-cfg.ludashi.com/inst/get3 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2496789859.000000000101D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-cfg.ludashi.com/inst/get3122 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2496789859.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-cfg.ludashi.com/inst/get3API.dllm(7 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2496789859.000000000101D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-cfg.ludashi.com/inst/get3cw5rG |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2134367065.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-stat.ludashi.com/downloader/soft/reportNew |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-stat.ludashi.com/downloader/soft/reportNew0; |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-stat.ludashi.com/downloader/soft/reportNewR |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://softmgr-stat.ludashi.com/downloader/soft/reportNewdownloader |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2134367065.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://softmgr-stat.ludashi.com/downloader/soft/reportNewk |
Source: Amcache.hve.4.dr | String found in binary or memory: http://upx.sf.net |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ludashi.com/lisence.htmlerror |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ludashi.com/stat/pc.php?pid= |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.openssl.org/support/faq.html |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E4A000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495182815.0000000002E4D000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2134367065.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn-hsy-file-ssl-pc.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E2A000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2496789859.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn-hsy-file-ssl-pc.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dll&ex_a |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002E4A000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495182815.0000000002E4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn-hsy-file-ssl-pc.ludashi.com/inst_pkgs/ludashi/6.1024.4100.1113/ludashi_lite_sem.dllt |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128668989.0000000002E07000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128229402.0000000002DF2000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2129047379.0000000002E07000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DF9000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2138280110.0000000002E08000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128382442.0000000002E07000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.comB |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://paint-s.ludashi.com/allcommon?ptype=thundercdn&s=CProgressPage::RecheckDownloadTaskhttp_info |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2495893985.0000000000681000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://www.ludashi.comhttps://www.ludashi.com/page/contact.phpnx |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: netbios.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | RDTSC instruction interceptor: First address: D81AB8 second address: F2BEE2 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 neg cl 0x00000006 bts eax, edx 0x00000009 inc dx 0x0000000c xor bl, cl 0x0000000e sal dl, cl 0x00000010 mov edx, dword ptr [esp+ecx] 0x00000013 add ax, sp 0x00000016 cmp di, dx 0x00000019 neg ax 0x0000001c lea edi, dword ptr [edi-00000004h] 0x00000022 movzx eax, si 0x00000025 bswap eax 0x00000027 mov dword ptr [edi], edx 0x00000029 rcl al, FFFFFF82h 0x0000002c mov eax, dword ptr [esi] 0x0000002e clc 0x0000002f jmp 00007FAF94CDF62Bh 0x00000034 add esi, 00000004h 0x0000003a clc 0x0000003b xor eax, ebx 0x0000003d xor eax, 05836C2Eh 0x00000042 clc 0x00000043 rol eax, 1 0x00000045 clc 0x00000046 add eax, 47AA4C98h 0x0000004b test esi, 25C5195Eh 0x00000051 jmp 00007FAF95029532h 0x00000056 bswap eax 0x00000058 cmp ch, 0000003Fh 0x0000005b xor ebx, eax 0x0000005d add ebp, eax 0x0000005f jmp 00007FAF94AF76E6h 0x00000064 lea eax, dword ptr [esp+60h] 0x00000068 cmp bp, di 0x0000006b test edi, 7F572217h 0x00000071 cmp edi, eax 0x00000073 ja 00007FAF94E5597Dh 0x00000079 push ebp 0x0000007a ret 0x0000007b movzx ecx, byte ptr [esi] 0x0000007e lea esi, dword ptr [esi+00000001h] 0x00000084 sal dh, 00000008h 0x00000087 xor cl, bl 0x00000089 bsr edx, ecx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | RDTSC instruction interceptor: First address: D0F75F second address: D0F779 instructions: 0x00000000 rdtsc 0x00000002 setno dh 0x00000005 dec ebp 0x00000006 btr dx, si 0x0000000a xadd edi, eax 0x0000000d not ebp 0x0000000f bsf si, si 0x00000013 bswap ebx 0x00000015 clc 0x00000016 lea ebp, dword ptr [ebp+ecx+00h] 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | RDTSC instruction interceptor: First address: 9064F1 second address: 9CAE9B instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 neg cl 0x00000006 bts eax, edx 0x00000009 inc dx 0x0000000c xor bl, cl 0x0000000e sal dl, cl 0x00000010 mov edx, dword ptr [esp+ecx] 0x00000013 add ax, sp 0x00000016 cmp di, dx 0x00000019 neg ax 0x0000001c lea edi, dword ptr [edi-00000004h] 0x00000022 movzx eax, si 0x00000025 bswap eax 0x00000027 mov dword ptr [edi], edx 0x00000029 rcl al, FFFFFF82h 0x0000002c mov eax, dword ptr [esi] 0x0000002e clc 0x0000002f jmp 00007FAF94BFD0BCh 0x00000034 add esi, 00000004h 0x0000003a clc 0x0000003b xor eax, ebx 0x0000003d xor eax, 05836C2Eh 0x00000042 clc 0x00000043 rol eax, 1 0x00000045 clc 0x00000046 add eax, 47AA4C98h 0x0000004b test esi, 25C5195Eh 0x00000051 jmp 00007FAF94F883D8h 0x00000056 bswap eax 0x00000058 cmp ch, 0000003Fh 0x0000005b xor ebx, eax 0x0000005d add ebp, eax 0x0000005f jmp 00007FAF94D064DEh 0x00000064 lea eax, dword ptr [esp+60h] 0x00000068 cmp bp, di 0x0000006b test edi, 7F572217h 0x00000071 cmp edi, eax 0x00000073 ja 00007FAF94D5E548h 0x00000079 push ebp 0x0000007a ret 0x0000007b movzx ecx, byte ptr [esi] 0x0000007e lea esi, dword ptr [esi+00000001h] 0x00000084 sal dh, 00000008h 0x00000087 xor cl, bl 0x00000089 bsr edx, ecx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe | RDTSC instruction interceptor: First address: A0A22A second address: A0A244 instructions: 0x00000000 rdtsc 0x00000002 setno dh 0x00000005 dec ebp 0x00000006 btr dx, si 0x0000000a xadd edi, eax 0x0000000d not ebp 0x0000000f bsf si, si 0x00000013 bswap ebx 0x00000015 clc 0x00000016 lea ebp, dword ptr [ebp+ecx+00h] 0x0000001a rdtsc |
Source: Amcache.hve.4.dr | Binary or memory string: VMware |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.4.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.4.dr | Binary or memory string: VMware20,1hbin@ |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128514702.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2134367065.000000000105F000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2495425390.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2494893876.000000000105C000.00000004.00000020.00020000.00000000.sdmp, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000003.2128936916.000000000105F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp |
Source: Amcache.hve.4.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.4.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.4.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: ZOOM#U89c6#U9891#U4f1a#U8bae_b0138065277.exe, 00000000.00000002.2497259410.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWj |
Source: Amcache.hve.4.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.4.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.4.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.4.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.4.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.4.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.4.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.4.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.4.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.4.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.4.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.4.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.4.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.4.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.4.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.4.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.4.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |