Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: test.exe, type: SAMPLE | Matched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth |
Source: 0.0.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net> |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet RAT Author: botherder https://github.com/botherder |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net> |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet_4 Author: unknown |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects DarkComet Author: ditekSHen |
Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000008.00000002.3265409763.00000000022D3000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth |
Source: 0000000C.00000002.2137622893.0000000002351000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000000.00000002.2021478489.00000000023B1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 0000000E.00000002.2218818182.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net> |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet RAT Author: botherder https://github.com/botherder |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net> |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet_4 Author: unknown |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net> |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet RAT Author: botherder https://github.com/botherder |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net> |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_4 Author: unknown |
Source: Process Memory Space: ChromeCookie.exe PID: 6484, type: MEMORYSTR | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: Process Memory Space: ChromeCookie.exe PID: 7320, type: MEMORYSTR | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: Process Memory Space: ChromeCookie.exe PID: 7520, type: MEMORYSTR | Matched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_ |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, type: DROPPED | Matched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00445844 NtdllDefWindowProc_A, | 0_2_00445844 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00446070 SetActiveWindow,ShowWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus, | 0_2_00446070 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004389B4 GetSubMenu,SaveDC,RestoreDC,SaveDC,RestoreDC,NtdllDefWindowProc_A, | 0_2_004389B4 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00430B10 NtdllDefWindowProc_A, | 0_2_00430B10 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004556F4 SetWindowPos,NtdllDefWindowProc_A,GetCapture, | 0_2_004556F4 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00463F64 NtdllDefWindowProc_A, | 0_2_00463F64 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00473F34 CreateProcessA,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,TerminateProcess, | 0_2_00473F34 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00445F90 SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A, | 0_2_00445F90 |
Source: test.exe, type: SAMPLE | Matched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 |
Source: 0.0.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04 |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara |
Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet |
Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000008.00000002.3265409763.00000000022D3000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 |
Source: 0000000C.00000002.2137622893.0000000002351000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000000.00000002.2021478489.00000000023B1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 0000000E.00000002.2218818182.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04 |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet |
Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04 |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet |
Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR | Matched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara |
Source: Process Memory Space: ChromeCookie.exe PID: 6484, type: MEMORYSTR | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: Process Memory Space: ChromeCookie.exe PID: 7320, type: MEMORYSTR | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: Process Memory Space: ChromeCookie.exe PID: 7520, type: MEMORYSTR | Matched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0 |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, type: DROPPED | Matched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 |
Source: unknown | Process created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe" | |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +h | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\test.exe" +s +h | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h | |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" | |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" | |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" | |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Windows\SysWOW64\notepad.exe notepad | |
Source: unknown | Process created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" | |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +h | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Process created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\test.exe" +s +h | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Process created: C:\Windows\SysWOW64\notepad.exe notepad | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: twext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: shacct.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: starttiledata.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: acppage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: aepic.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: idstore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: wlidprov.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Section loaded: provsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\attrib.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\attrib.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\attrib.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\attrib.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: mrmcorer.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: efswrt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\notepad.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: avicap32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msvfw32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004186D4 push ecx; mov dword ptr [esp], edx | 0_2_004186D9 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0048F0AC push 0048F125h; ret | 0_2_0048F11D |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0048F6D4 push 0048F761h; ret | 0_2_0048F759 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00482058 push 004820C2h; ret | 0_2_004820BA |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0045E078 push 0045E0DEh; ret | 0_2_0045E0D6 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004220E0 push ecx; mov dword ptr [esp], ecx | 0_2_004220E1 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004660F8 push 00466130h; ret | 0_2_00466128 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0042E138 push 0042E170h; ret | 0_2_0042E168 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004741C8 push 00474206h; ret | 0_2_004741FE |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004041DC push eax; ret | 0_2_00404218 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0046224C push 00462284h; ret | 0_2_0046227C |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00464228 push ecx; mov dword ptr [esp], edx | 0_2_00464229 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004482C4 push 0044832Eh; ret | 0_2_00448326 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0041632A push 004163A2h; ret | 0_2_0041639A |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0041632C push 004163A2h; ret | 0_2_0041639A |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0048E3AC push 0048E3DCh; ret | 0_2_0048E3D4 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0046E3A0 push 0046E3EDh; ret | 0_2_0046E3E5 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004204E4 push ecx; mov dword ptr [esp], edx | 0_2_004204E9 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004086CC push 0040870Eh; ret | 0_2_00408706 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0044A74C push ecx; mov dword ptr [esp], edx | 0_2_0044A750 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_004107FC push 00410828h; ret | 0_2_00410820 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0042E8B8 push 0042E8E4h; ret | 0_2_0042E8DC |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00430910 push 00430970h; ret | 0_2_00430968 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00422924 push 00422967h; ret | 0_2_0042295F |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00418930 push ecx; mov dword ptr [esp], edx | 0_2_00418935 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0044A9F0 push ecx; mov dword ptr [esp], edx | 0_2_0044A9F4 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_0045E988 push 0045E9B4h; ret | 0_2_0045E9AC |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00418A50 push ecx; mov dword ptr [esp], edx | 0_2_00418A55 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00460A20 push 00460A53h; ret | 0_2_00460A4B |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00432AD0 push 00432B1Ch; ret | 0_2_00432B14 |
Source: C:\Users\user\Desktop\test.exe | Code function: 0_2_00418A94 push ecx; mov dword ptr [esp], edx | 0_2_00418A99 |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 500000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 510000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 520000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 530000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 540000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 550000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 560000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 570000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 580000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 590000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 5A0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 5B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 5C0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 7B0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 5D0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 5E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 600000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 610000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory allocated: C:\Windows\SysWOW64\notepad.exe base: 620000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 500000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 510000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 520000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 530000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 540000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 550000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 560000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 570000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 580000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 590000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 5A0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 5B0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 5C0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 7B0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 5D0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 5E0000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 600000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 610000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe | Memory written: C:\Windows\SysWOW64\notepad.exe base: 620000 | Jump to behavior |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh< |
Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Manager |
Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_TrayWnd |
Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Progman |
Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Managerect` |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_TrayWndjjh |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Progmanjhh |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywndTrayNotifyWndjh |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ProgmanU |
Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: Program Manager` |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ButtonShell_TrayWndj |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywndReBarWindow32jh |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywndReBarWindow32jhD |
Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_traywnd |
Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Shell_TrayWndPjjh |