Source: Vhl3X1aYeU.exe, 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: \autorun.inf |
Source: Vhl3X1aYeU.exe, 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: [autorun] |
Source: Vhl3X1aYeU.exe, 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: autorun.inf |
Source: Vhl3X1aYeU.exe | Binary or memory string: \autorun.inf |
Source: Vhl3X1aYeU.exe | Binary or memory string: [autorun] |
Source: Vhl3X1aYeU.exe | Binary or memory string: autorun.inf |
Source: Explower.exe2.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe2.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe2.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe1.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe1.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe1.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe4.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe4.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe4.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe3.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe3.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe3.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe7.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe7.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe7.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe6.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe6.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe6.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe0.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe0.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe0.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe5.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe5.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe5.0.dr | Binary or memory string: autorun.inf |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects njRAT based on some strings Author: Sekoia.io |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: Vhl3X1aYeU.exe, type: SAMPLE | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: 0.0.Vhl3X1aYeU.exe.5a0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 00000000.00000000.1671418007.00000000005A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ifmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasmontr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mfc42u.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: authfwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcmonitor.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3cfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3api.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: onex.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: hnetmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netshell.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netsetupapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netiohlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: httpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: polstore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshwfp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2pnetsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2p.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rpcnsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: whhelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlancfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wshelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: peerdistsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wcmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mobilenetworking.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprmsg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ifmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasmontr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mfc42u.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: authfwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcmonitor.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3cfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3api.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: onex.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: hnetmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netshell.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netsetupapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netiohlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: httpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: polstore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshwfp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2pnetsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2p.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rpcnsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: whhelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlancfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wshelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: peerdistsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wcmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mobilenetworking.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprmsg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ifmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasmontr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mfc42u.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: authfwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcmonitor.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3cfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3api.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: onex.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: hnetmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netshell.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netsetupapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netiohlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: httpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: polstore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshwfp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2pnetsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2p.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rpcnsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: whhelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlancfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wshelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: peerdistsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wcmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mobilenetworking.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprmsg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: F50000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2C40000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 4C40000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 5AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 6AA0000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 6CD0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 7CD0000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 7F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 8F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 9F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 6060000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 7CD0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 9F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: AF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: BF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: CF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: DF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: EF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 8F80000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: FF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 10F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 11F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: A400000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 12F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 13F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 14F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 15F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 16F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 17F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 18F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 19F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1AF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: C520000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: D520000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: E520000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1BF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1CF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1DF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1EF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1FF20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 20F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 21F20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 22F20000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 24130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 25130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 26130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 27130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 28130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 29130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2A130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2B130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2C130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2D130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: F520000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: C620000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: D620000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: E620000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: F620000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: D660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: E660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: F660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 10660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 11660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 12660000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: F7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 107A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 117A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 127A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 137A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 147A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 157A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 167A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 177A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 187A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 197A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1A7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1B7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1C7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1D7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1E7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 1F7A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 207A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 217A0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2E130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 2F130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 30130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\Vhl3X1aYeU.exe | Memory allocated: 31130000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: FD0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: 2C00000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: 4C00000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:18 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:59:36 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:28:56 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 19:01:50 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:01:13 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:20 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:00:01 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:45 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:59:08 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:40 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:06:27 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:00 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:59:31 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:59:24 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:12 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 10:51:05 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 11:27:45 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 06:12:19 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:05:39 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:34 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:40 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:36 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:01:07 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:50 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 00:35:17 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:26 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:36 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:26:42 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 11:11:59 - Program Manager |
Source: Explower.exe, 00000007.00000002.1837225047.000000000511B000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: dProgram Manager` |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000007.00000002.1836870113.0000000002C32000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:15 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:28 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000007.00000002.1836870113.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000007.00000002.1836870113.0000000002C01000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 19:30:17 - Program Manager |
Source: Vhl3X1aYeU.exe, Explower.exe2.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr, Explower.exe5.0.dr | Binary or memory string: ProgMan |
Source: Explower.exe, 00000007.00000002.1836870113.0000000002C32000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000007.00000002.1836870113.0000000002C01000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: kedProgram Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:23 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:59:18 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:55 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:30 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:00:24 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:19 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/10 | 07:53:28 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:26 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:27 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:30:14 - Program Manager |
Source: Vhl3X1aYeU.exe, Explower.exe2.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr, Explower.exe5.0.dr | Binary or memory string: Shell_traywnd+MostrarBarraDeTarefas |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:31 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:23 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:33 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:11 - Program Manager |
Source: Vhl3X1aYeU.exe, Explower.exe2.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr, Explower.exe5.0.dr | Binary or memory string: Shell_TrayWnd |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:01 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:15 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:07:17 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:42 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:01:53 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 19:01:16 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:57:39 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:01:33 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 18:37:06 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:04 - Program Manager |
Source: Vhl3X1aYeU.exe, 00000000.00000002.4123012226.0000000002C41000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 25/01/07 | 17:58:14 - Program Manager |