Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnu | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06 | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsV | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/ | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsH | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsab | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsR | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt: | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsN | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js$ | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookies | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsD | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsO | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/ | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz/ | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js8 | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdez | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsl | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71 | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsder | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsk | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderH | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js2 | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphy | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3 | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/Dc | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderA | Avira URL Cloud: Label: malware |
Source: 632313373.xyz | Avira URL Cloud: Label: malware |
Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js/ | Avira URL Cloud: Label: malware |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://c.pki.goog/r/gsr1.crl0 |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://c.pki.goog/r/r4.crl0 |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://c.pki.goog/we1/PCUeQViQlYc.crl0 |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://i.pki.goog/gsr1.crt0- |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://i.pki.goog/r4.crt0 |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://i.pki.goog/we1.crt |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://i.pki.goog/we1.crt0 |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://o.pki.goog/s/we1/lk00% |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz/ |
Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/ |
Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/Dc |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js$ |
Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js/ |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71 |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js2 |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3 |
Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/ |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06 |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js8 |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsD |
Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsH |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnu |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsN |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsO |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsR |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsV |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsab |
Source: mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsder |
Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderA |
Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderH |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdez |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookies |
Source: mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphy |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsk |
Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsl |
Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt: |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsr |
Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/ |
Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/what?indextype=1&__cfduid= |
Source: mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EBA1000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036539520.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462820088.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/what?indextype=1&__cfduid=GZW54oS6Gn_3HDDEOVbu04tVtOzZbJnhQvE7m469jmEnCoTJ8cr |
Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Trojan_Raw_Generic_4 Author: unknown |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: Process Memory Space: mode11_buqd.exe PID: 7360, type: MEMORYSTR | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: Process Memory Space: mode11_buqd.exe PID: 7360, type: MEMORYSTR | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |