Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0027F826 __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, | 0_2_0027F826 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00291630 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW, | 0_2_00291630 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0075E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 6_2_0075E387 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0075D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 6_2_0075D836 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0075DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 6_2_0075DB69 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00769F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 6_2_00769F9F |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0076A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 6_2_0076A0FA |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0076A488 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 6_2_0076A488 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_007665F1 FindFirstFileW,FindNextFileW,FindClose, | 6_2_007665F1 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00767248 FindFirstFileW,FindClose, | 6_2_00767248 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_007672E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 6_2_007672E9 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0102E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose, | 15_2_0102E387 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0102D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 15_2_0102D836 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0102DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 15_2_0102DB69 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_01039F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 15_2_01039F9F |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0103A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 15_2_0103A0FA |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_010365F1 FindFirstFileW,FindNextFileW,FindClose, | 15_2_010365F1 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0103A488 FindFirstFileW,Sleep,FindNextFileW,FindClose, | 15_2_0103A488 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_01037248 FindFirstFileW,FindClose, | 15_2_01037248 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_010372E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime, | 15_2_010372E9 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.26.255.81 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: RegSvcs.exe, 0000000C.00000002.4091230797.000000000188B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: RegSvcs.exe, 0000000C.00000002.4091230797.000000000188B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab%6f |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: cipkucw.ppt.exe, 00000011.00000003.2160334326.0000000000D86000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 00000011.00000003.2160509508.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 00000011.00000003.2139352487.0000000000D86000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.microO |
Source: RegSvcs.exe, 0000000C.00000002.4092763243.0000000003721000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000000.1778450819.00000000007C5000.00000002.00000001.01000000.0000000A.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000002.2022650449.0000000001095000.00000002.00000001.01000000.0000000E.sdmp, cipkucw.ppt.exe, 00000011.00000002.2169095460.0000000001095000.00000002.00000001.01000000.0000000E.sdmp, cipkucw.ppt.exe, 00000013.00000000.2151242199.0000000001095000.00000002.00000001.01000000.0000000E.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: https://www.autoitscript.com/autoit3/ |
Source: yjOJ1YK5M3.exe, 00000000.00000003.1673628666.0000000006B08000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1795819448.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt, 00000006.00000003.1828917683.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.exe, 0000000F.00000003.1956923132.0000000001658000.00000004.00000020.00020000.00000000.sdmp, cipkucw.ppt.0.dr, cipkucw.ppt.exe.exe.15.dr, cipkucw.ppt.6.dr, cipkucw.ppt.exe0.6.dr, cipkucw.ppt.exe.6.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: Yara match | File source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000011.00000003.2138978432.0000000003626000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000003.2001032731.000000000173E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000003.2000519761.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000C.00000002.4092763243.0000000003721000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000003.1874054223.000000000361A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000003.2219656121.0000000001845000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000003.2000805264.0000000003E3C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000003.1873750371.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000003.2000748696.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000003.1873380040.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000010.00000002.2048370610.0000000000762000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000003.2139352487.0000000000D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000003.2219758241.0000000003CBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000003.2218782677.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000003.2138543622.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000003.2219549632.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000011.00000003.2138854777.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000003.1874482943.0000000000F82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000F.00000003.2001114393.0000000001628000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000013.00000003.2219993576.0000000001854000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: cipkucw.ppt PID: 1420, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 2800, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cipkucw.ppt.exe PID: 3484, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cipkucw.ppt.exe PID: 3732, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cipkucw.ppt.exe PID: 5780, type: MEMORYSTR |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000011.00000003.2138978432.0000000003626000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000011.00000003.2138978432.0000000003626000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0000000F.00000003.2001032731.000000000173E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0000000F.00000003.2001032731.000000000173E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0000000F.00000003.2000519761.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0000000F.00000003.2000519761.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000006.00000003.1874054223.000000000361A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000006.00000003.1874054223.000000000361A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000013.00000003.2219656121.0000000001845000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000013.00000003.2219656121.0000000001845000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0000000F.00000003.2000805264.0000000003E3C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0000000F.00000003.2000805264.0000000003E3C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000006.00000003.1873750371.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0000000F.00000003.2000748696.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000006.00000003.1873380040.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000006.00000003.1873380040.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000010.00000002.2048370610.0000000000762000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000010.00000002.2048370610.0000000000762000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000011.00000003.2139352487.0000000000D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000011.00000003.2139352487.0000000000D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000013.00000003.2219758241.0000000003CBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000013.00000003.2219758241.0000000003CBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000013.00000003.2218782677.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000013.00000003.2218782677.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000011.00000003.2138543622.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000011.00000003.2138543622.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000013.00000003.2219549632.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000011.00000003.2138854777.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000006.00000003.1874482943.0000000000F82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000006.00000003.1874482943.0000000000F82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0000000F.00000003.2001114393.0000000001628000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0000000F.00000003.2001114393.0000000001628000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000013.00000003.2219993576.0000000001854000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000013.00000003.2219993576.0000000001854000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028355D | 0_2_0028355D |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028B76F | 0_2_0028B76F |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0027BF3D | 0_2_0027BF3D |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028A008 | 0_2_0028A008 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0029C0D6 | 0_2_0029C0D6 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028A222 | 0_2_0028A222 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00285214 | 0_2_00285214 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028C27F | 0_2_0028C27F |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002992D0 | 0_2_002992D0 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002A4360 | 0_2_002A4360 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002846CF | 0_2_002846CF |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002A86D2 | 0_2_002A86D2 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002A480E | 0_2_002A480E |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_002748AA | 0_2_002748AA |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00275AFE | 0_2_00275AFE |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028ABC8 | 0_2_0028ABC8 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0028BC05 | 0_2_0028BC05 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00277CBA | 0_2_00277CBA |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00284D32 | 0_2_00284D32 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00273D9D | 0_2_00273D9D |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_0029BEA7 | 0_2_0029BEA7 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00275F39 | 0_2_00275F39 |
Source: C:\Users\user\Desktop\yjOJ1YK5M3.exe | Code function: 0_2_00285F0B | 0_2_00285F0B |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00718037 | 6_2_00718037 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00712007 | 6_2_00712007 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0070E0BE | 6_2_0070E0BE |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_006FE1A0 | 6_2_006FE1A0 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_006F225D | 6_2_006F225D |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_007122C2 | 6_2_007122C2 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0072A28E | 6_2_0072A28E |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0070C59E | 6_2_0070C59E |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0077C7A3 | 6_2_0077C7A3 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0072E89F | 6_2_0072E89F |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0076291A | 6_2_0076291A |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00726AFB | 6_2_00726AFB |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00758B27 | 6_2_00758B27 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_0071CE30 | 6_2_0071CE30 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00727169 | 6_2_00727169 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_007851D2 | 6_2_007851D2 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_006F9240 | 6_2_006F9240 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_006F9499 | 6_2_006F9499 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00711724 | 6_2_00711724 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00711A96 | 6_2_00711A96 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_006F9B60 | 6_2_006F9B60 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00717BAB | 6_2_00717BAB |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00711D40 | 6_2_00711D40 |
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\cipkucw.ppt | Code function: 6_2_00717DDA | 6_2_00717DDA |
Source: C:\Users\user\AppData\Local\Temp\RegSvcs.exe | Code function: 12_2_01B74158 | 12_2_01B74158 |
Source: C:\Users\user\AppData\Local\Temp\RegSvcs.exe | Code function: 12_2_01B74A28 | 12_2_01B74A28 |
Source: C:\Users\user\AppData\Local\Temp\RegSvcs.exe | Code function: 12_2_01B75FE8 | 12_2_01B75FE8 |
Source: C:\Users\user\AppData\Local\Temp\RegSvcs.exe | Code function: 12_2_01B73E10 | 12_2_01B73E10 |
Source: C:\Users\user\AppData\Local\Temp\RegSvcs.exe | Code function: 12_2_07B41B10 | 12_2_07B41B10 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FDE0BE | 15_2_00FDE0BE |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE8037 | 15_2_00FE8037 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE2007 | 15_2_00FE2007 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FCE1A0 | 15_2_00FCE1A0 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE22C2 | 15_2_00FE22C2 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FFA28E | 15_2_00FFA28E |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FC225D | 15_2_00FC225D |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FDC59E | 15_2_00FDC59E |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0104C7A3 | 15_2_0104C7A3 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_0103291A | 15_2_0103291A |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FFE89F | 15_2_00FFE89F |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FF6AFB | 15_2_00FF6AFB |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_01028B27 | 15_2_01028B27 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FECE30 | 15_2_00FECE30 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_010551D2 | 15_2_010551D2 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FF7169 | 15_2_00FF7169 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FC9240 | 15_2_00FC9240 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FC9499 | 15_2_00FC9499 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE1724 | 15_2_00FE1724 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE1A96 | 15_2_00FE1A96 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE7BAB | 15_2_00FE7BAB |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FC9B60 | 15_2_00FC9B60 |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE7DDA | 15_2_00FE7DDA |
Source: C:\Users\user\AppData\Local\Temp\afda\cipkucw.ppt.exe | Code function: 15_2_00FE1D40 | 15_2_00FE1D40 |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 17.3.cipkucw.ppt.exe.d56820.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 19.3.cipkucw.ppt.exe.1854810.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 16.2.RegSvcs.exe.760000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 17.3.cipkucw.ppt.exe.d35810.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 15.3.cipkucw.ppt.exe.175e018.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 6.3.cipkucw.ppt.fb2828.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 6.3.cipkucw.ppt.f91818.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 19.3.cipkucw.ppt.exe.1854810.2.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 19.3.cipkucw.ppt.exe.1875820.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000011.00000003.2138978432.0000000003626000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000011.00000003.2138978432.0000000003626000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0000000F.00000003.2001032731.000000000173E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0000000F.00000003.2001032731.000000000173E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0000000F.00000003.2000519761.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0000000F.00000003.2000519761.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000006.00000003.1874054223.000000000361A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000006.00000003.1874054223.000000000361A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000013.00000003.2219656121.0000000001845000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000013.00000003.2219656121.0000000001845000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0000000F.00000003.2000805264.0000000003E3C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0000000F.00000003.2000805264.0000000003E3C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000006.00000003.1873750371.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0000000F.00000003.2000748696.000000000174E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000006.00000003.1873380040.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000006.00000003.1873380040.0000000000FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000010.00000002.2048370610.0000000000762000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000010.00000002.2048370610.0000000000762000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000011.00000003.2139352487.0000000000D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000011.00000003.2139352487.0000000000D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000013.00000003.2219758241.0000000003CBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000013.00000003.2219758241.0000000003CBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000013.00000003.2218782677.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000013.00000003.2218782677.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000011.00000003.2138543622.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000011.00000003.2138543622.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000013.00000003.2219549632.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000011.00000003.2138854777.0000000000D47000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000006.00000003.1874482943.0000000000F82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000006.00000003.1874482943.0000000000F82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0000000F.00000003.2001114393.0000000001628000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0000000F.00000003.2001114393.0000000001628000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000013.00000003.2219993576.0000000001854000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000013.00000003.2219993576.0000000001854000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |