Click to jump to signature section
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack | Malware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"} |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | TCP traffic detected without corresponding DNS query: 162.159.36.2 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: 0I9GLRSiy0.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: 0I9GLRSiy0.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: 0I9GLRSiy0.exe | String found in binary or memory: http://localhost/calculator_server/requests.php |
Source: 0I9GLRSiy0.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: 0I9GLRSiy0.exe | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_02673E28 | 0_2_02673E28 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_02676F90 | 0_2_02676F90 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0267DFB4 | 0_2_0267DFB4 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FDAC88 | 0_2_06FDAC88 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FDB8A0 | 0_2_06FDB8A0 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FDAFD0 | 0_2_06FDAFD0 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD5FA8 | 0_2_06FD5FA8 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD5FA7 | 0_2_06FD5FA7 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3F50 | 0_2_06FD3F50 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD6590 | 0_2_06FD6590 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD4388 | 0_2_06FD4388 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD4379 | 0_2_06FD4379 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3B18 | 0_2_06FD3B18 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_076508A4 | 0_2_076508A4 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_07652518 | 0_2_07652518 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_07650868 | 0_2_07650868 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_07650810 | 0_2_07650810 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_07650895 | 0_2_07650895 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A916AD0 | 0_2_0A916AD0 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A9132C8 | 0_2_0A9132C8 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A919018 | 0_2_0A919018 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A910040 | 0_2_0A910040 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A917878 | 0_2_0A917878 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A91DF00 | 0_2_0A91DF00 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A910006 | 0_2_0A910006 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A918930 | 0_2_0A918930 |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.00000000038E0000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMontero.dll8 vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000000.2130680253.000000000044A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameazmse.exe" vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3388981720.000000000085E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3393157835.00000000058A0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameArthur.dll" vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3394008794.0000000006F30000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMontero.dll8 vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002911000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameArthur.dll" vs 0I9GLRSiy0.exe |
Source: 0I9GLRSiy0.exe | Binary or memory string: OriginalFilenameazmse.exe" vs 0I9GLRSiy0.exe |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002902000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028EF000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_02675E00 push eax; iretd | 0_2_02675E09 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3656 push ecx; iretd | 0_2_06FD3658 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD6FD5 push eax; iretd | 0_2_06FD6FD6 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD6F93 push ecx; iretd | 0_2_06FD6F94 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD1F89 push 1FB806FBh; iretd | 0_2_06FD1F96 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3788 push ecx; iretd | 0_2_06FD378A |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD9F68 pushad ; iretd | 0_2_06FD9F71 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD34E5 push ecx; iretd | 0_2_06FD34E7 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3466 push ecx; iretd | 0_2_06FD3468 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD343F push ecx; iretd | 0_2_06FD3441 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD7429 push edx; iretd | 0_2_06FD7436 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD5DC2 push eax; iretd | 0_2_06FD5DC6 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3581 push ecx; iretd | 0_2_06FD3583 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD5D6A push eax; iretd | 0_2_06FD5D76 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3557 push ecx; iretd | 0_2_06FD3559 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3512 push ecx; iretd | 0_2_06FD3514 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD72A9 push edx; iretd | 0_2_06FD72B4 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD5228 push ecx; iretd | 0_2_06FD5446 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD7B80 push ecx; iretd | 0_2_06FD7B8E |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD735A push edx; iretd | 0_2_06FD735C |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD38A7 push ecx; iretd | 0_2_06FD38A9 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FDC885 pushfd ; iretd | 0_2_06FDC88A |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD2049 push 24F806FBh; iretd | 0_2_06FD2056 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD3812 push ecx; iretd | 0_2_06FD3814 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD71EA push ecx; iretd | 0_2_06FD71EB |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD39C1 push ecx; iretd | 0_2_06FD39C3 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD7164 push ecx; iretd | 0_2_06FD7165 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_06FD7919 pushfd ; iretd | 0_2_06FD7925 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Code function: 0_2_0A91D061 push es; ret | 0_2_0A91D070 |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 2560000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 2800000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 2560000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 7710000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 8710000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 88C0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Memory allocated: 98C0000 memory reserve | memory write watch | Jump to behavior |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: vmware |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: VMwareVBox |
Source: 0I9GLRSiy0.exe, 00000000.00000002.3393283957.0000000005957000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Users\user\Desktop\0I9GLRSiy0.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\0I9GLRSiy0.exe | Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities | Jump to behavior |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR |