Windows Analysis Report SEMqjw.exe

Overview

General Information

Sample Name: SEMqjw.exe
Analysis ID: 511809
MD5: 1eeced28416a157bb6c1915c75f01bd3
SHA1: eb423477cacd23647bc3a5af5f7b86e64e41826a
SHA256: b5070e72b3a0b2f30e8333b2bb37e3db553bba74d24869a302cf65d1af4c568f
Infos:

Most interesting Screenshot:

Detection

Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected potential unwanted application
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains strange resources
Allocates memory with a write watch (potentially for evading sandboxes)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Queries the installation date of Windows
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
IP address seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: SEMqjw.exe Avira: detected
Multi AV Scanner detection for submitted file
Source: SEMqjw.exe Metadefender: Detection: 28% Perma Link
Source: SEMqjw.exe ReversingLabs: Detection: 82%
Machine Learning detection for sample
Source: SEMqjw.exe Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: SEMqjw.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: SEMqjw.exe Static PE information: certificate valid
Source: unknown HTTPS traffic detected: 104.20.184.68:443 -> 192.168.2.6:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.7.139:443 -> 192.168.2.6:49808 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.69.19:443 -> 192.168.2.6:49815 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.230:443 -> 192.168.2.6:49814 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.22:443 -> 192.168.2.6:49826 version: TLS 1.2

Networking:

barindex
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /cookieconsentpub/v1/geo/location HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: geolocation.onetrust.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /tag?o=6208086025961472&upapi=true HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: btloader.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /px.gif?ch=1&e=0.6358356914721921 HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ad-delivery.netConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico?ad=300x250&ad_box_=1&adnet=1&showad=1&size=250x250 HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ad.doubleclick.netConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /lo/api/res/1.2/z3nJ.i0wJLUKE.PUO3hx1w--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1pbmk7cT0xMDA-/https://s.yimg.com/av/ads/1634277746662-1414.jpg HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: s.yimg.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /tag?o=6208086025961472&upapi=true HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehp&AR=1Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: btloader.comIf-None-Match: "643eb1aad6ba3932ca744b96ffc00048"Connection: Keep-Alive
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 172.67.69.19 172.67.69.19
Source: Joe Sandbox View IP Address: 87.248.118.22 87.248.118.22
Source: Joe Sandbox View IP Address: 87.248.118.22 87.248.118.22
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49887
Source: unknown Network traffic detected: HTTP traffic on port 49814 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49815 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49826 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49808 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49808
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49815
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49826
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49814
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 49887 -> 443
Source: de-ch[1].htm.1.dr String found in binary or memory: <a href="https://www.facebook.com/" target="_blank" data-piitxt="facebooklite" piiurl="https://www.facebook.com/"> equals www.facebook.com (Facebook)
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: 0http://www.hotmail.msn.com/pii/ReadOutlookEmail/ equals www.hotmail.com (Hotmail)
Source: de-ch[1].htm.1.dr String found in binary or memory: <link rel="preconnect" href="img-s-msn-com.akamaized.net" /><link rel="preconnect" href="c.msn.com" /><link rel="preconnect" href="c.msn.cn" /><link rel="preconnect" href="https://www.bing.com" /><link rel="preconnect" href="//web.vortex.data.msn.com" /><link rel="dns-prefetch" href="img-s-msn-com.akamaized.net" /><link rel="dns-prefetch" href="c.msn.com" /><link rel="dns-prefetch" href="c.msn.cn" /><link rel="dns-prefetch" href="https://www.bing.com" /><link rel="dns-prefetch" href="//web.vortex.data.msn.com" /><link rel="canonical" href="https://www.msn.com/de-ch/" /><meta name="msapplication-TileColor" content="#224f7b"/><meta name="msapplication-TileImage" content="//static-global-s-msn-com.akamaized.net/hp-neu/sc/1f/08ced4.png"/><meta name="msapplication-config" content="none"/> <title>MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365</title> equals www.hotmail.com (Hotmail)
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: glich.",errorFooterText:"Zu Twitter wechseln",taskLinks:"Benachrichtigungen|https://twitter.com/i/notifications;Ich|#;Abmelden|#"}],xbox:[{header:"Spotlight",content:"",footerText:"Alle anzeigen",footerUrl:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"},{header:"Meine tolle Wiedergabeliste",headerUrl:"https://aka.ms/qeqf5y",content:"",errorMessage:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"}],bingrewards:[{header:"Pr equals www.twitter.com (Twitter)
Source: de-ch[1].htm.1.dr String found in binary or memory: hren, die sich auf Ihren Internetdatenverkehr auswirken.<br/><br/><a href=\""+e.html(f)+'" onclick="window.location.reload(true)">Klicken Sie hier<\/a> um diese Seite erneut zu laden, oder besuchen Sie: <a href="'+i+'">'+i+"<\/a><\/p><\/div><div id='errorref'><span>Ref 1: "+e.html(o(t.clientSettings.aid))+"&nbsp;&nbsp;&nbsp;Ref 2: "+e.html(t.clientSettings.sid||"000000")+"&nbsp;&nbsp;&nbsp;Ref 3: "+e.html((new r.Date).toUTCString())+"<\/span><\/div><\/div>"});ot({errId:1512,errMsg:n})}function ot(n){require(["track"],function(t){var i={errId:n.errId,errMsg:n.errMsg,reportingType:0};t.trackAppErrorEvent(i)})}function tt(){var n=v(arguments);a(l(n,b),n,!0)}function st(){var n=v(arguments);a(l(n,h),n)}function ht(){var n=v(arguments);a(l(n,y),n)}function ct(n){(r.console||{}).timeStamp?console.timeStamp(n):(r.performance||{}).mark&&r.performance.mark(n)}var w=0,it=-1,b=0,h=1,y=2,s=[],p,k,rt,o,d=!1,c=Math.random()*100<=-1;return ut(r,function(n,t,i,r){return w++,n=nt(n,t,i,r," [ENDMESSAGE]"),n&&tt("[SCRIPTERROR] "+n),!0}),c&&require(["jquery","c.deferred"],function(n){k=!0;rt=n;s.length&&g()}),{error:tt,fatalError:et,unhandledErrorCount:function(){return w},perfMark:ct,warning:st,information:ht}});require(["viewAwareInit"],function(n){n({size2row:"(min-height: 48.75em)",size1row:"(max-height: 48.74em)",size4column:"(min-width: 72em)",size3column:"(min-width: 52.313em) and (max-width: 71.99em)",size2column:"(min-width: 43.75em) and (max-width: 52.303em)",size2rowsize4column:"(min-width: 72em) and (min-height: 48.75em)",size2rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (min-height: 48.75em)",size2rowsize2column:"(max-width: 52.303em) and (min-height: 48.75em)",size1rowsize4column:"(min-width: 72em) and (max-height: 48.74em)",size1rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (max-height: 48.74em)",size1rowsize2column:"(max-width: 52.303em) and (max-height: 48.74em)"})});require(["deviceInit"],function(n){n({AllowTransform3d:"false",AllowTransform2d:"true",RtlScrollLeftAdjustment:"none",ShowMoveTouchGestures:"true",SupportFixedPosition:"true",UseCustomMatchMedia:null,Viewport_Behavior:"Default",Viewport_Landscape:null,Viewport:"width=device-width,initial-scale=1.0",IsMobileDevice:"false"})})</script><meta property="sharing_url" content="https://www.msn.com/de-ch"/><meta property="og:url" content="https://www.msn.com/de-ch/"/><meta property="og:title" content="MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365"/><meta property="twitter:card" content="summary_large_image"/><meta property="og:type" content="website"/><meta property="og:site_name" content="MSN"/><meta property="og:image" content="https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/519670.jpg"/><link rel="shortcut icon" href="//static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico" /><style>@media screen and (max-width:78.99em) and (min-width:58.875em){.layout-none:not(.mod1) .pos2{left:0}}.ie8 .grid .pick4~li.pick
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://www.youtube.com equals www.youtube.com (Youtube)
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://www.youtube.com6 equals www.youtube.com (Youtube)
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://www.youtube.com< equals www.youtube.com (Youtube)
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://www.facebook.com/msncht! equals www.facebook.com (Facebook)
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.facebook.com (Facebook)
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.twitter.com (Twitter)
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: ter erneut.",viewInboxErrorMessage:"Wenn beim Anzeigen Ihres Posteingangs weiterhin ein Problem auftritt, besuchen Sie",taskLinks:"Verfassen|https://outlook.live.com/mail/deeplink/compose;Kalender|https://outlook.live.com/calendar",piiText:"Read Outlook Email",piiUrl:"http://www.hotmail.msn.com/pii/ReadOutlookEmail/"}],office:[{header:"Office",content:"Zeigen Sie Ihre zuletzt verwendeten Dokumente an oder erstellen Sie kostenlos mit Office Online ein neues.",footerText:"Anmelden",footerUrl:"[[signin]]",ssoAutoRefresh:!0,taskLinks:"Word Online|https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel Online|https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway|https://www.sway.com/?WT.mc_id=MSN_site&utm_source=MSN&utm_medium=Topnav&utm_campaign=link;PowerPoint Online|https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site"},{header:"Aktuelle Dokumente",headerUrl:"https://onedrive.live.com/#qt=mru",content:"Wird geladen ...",noContent:"Dieser Ordner ist leer. Klicken Sie unten, um ein neues Dokument zu erstellen.",errorMessage:"Keine Verbindung mit Office Online m equals www.hotmail.com (Hotmail)
Source: SEMqjw.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SEMqjw.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: SEMqjw.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: SEMqjw.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SEMqjw.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: SEMqjw.exe String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SEMqjw.exe String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: SEMqjw.exe String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: SEMqjw.exe String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SEMqjw.exe String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SEMqjw.exe String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: SEMqjw.exe String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://docs.google.com/
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://drive.google.com/
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://drive.google.com/C
Source: SEMqjw.exe, 00000001.00000003.334347179.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://en.w
Source: SEMqjw.exe, 00000001.00000003.339458621.0000000006EFC000.00000004.00000001.sdmp String found in binary or memory: http://en.wikip
Source: SEMqjw.exe, 00000001.00000003.353670236.000000000775B000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.353638048.0000000007748000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.354457963.0000000007761000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: http://hblg.media.net/nerrping.php
Source: SEMqjw.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: SEMqjw.exe String found in binary or memory: http://ocsp.digicert.com0H
Source: SEMqjw.exe String found in binary or memory: http://ocsp.digicert.com0I
Source: SEMqjw.exe String found in binary or memory: http://ocsp.digicert.com0O
Source: de-ch[1].htm.1.dr String found in binary or memory: http://ogp.me/ns#
Source: de-ch[1].htm.1.dr String found in binary or memory: http://ogp.me/ns/fb#
Source: SEMqjw.exe, 00000001.00000003.343779327.0000000006F47000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/typedesigners.html
Source: SEMqjw.exe, 00000001.00000003.343779327.0000000006F47000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/typedesigners.html_oFJ
Source: SEMqjw.exe String found in binary or memory: http://www.digicert.com/CPS0
Source: SEMqjw.exe String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: SEMqjw.exe, 00000001.00000003.347589300.0000000006F15000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: SEMqjw.exe, 00000001.00000003.344693671.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com$
Source: SEMqjw.exe, 00000001.00000003.344693671.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com6
Source: SEMqjw.exe, 00000001.00000003.347589300.0000000006F15000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comF
Source: SEMqjw.exe, 00000001.00000003.344693671.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comals
Source: SEMqjw.exe, 00000001.00000003.347589300.0000000006F15000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comico
Source: SEMqjw.exe, 00000001.00000003.347589300.0000000006F15000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comma6
Source: SEMqjw.exe, 00000001.00000003.344693671.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comsief
Source: SEMqjw.exe, 00000001.00000003.344693671.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com~
Source: SEMqjw.exe, 00000001.00000003.340872419.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/
Source: SEMqjw.exe, 00000001.00000003.340872419.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnd
Source: SEMqjw.exe, 00000001.00000003.345082684.0000000006F47000.00000004.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: SEMqjw.exe, 00000001.00000003.339687984.0000000006F0F000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.krc6
Source: SEMqjw.exe, 00000001.00000003.339687984.0000000006F0F000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.krnyTF
Source: SEMqjw.exe, 00000001.00000003.339687984.0000000006F0F000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.krv
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: http://www.hotmail.msn.com/pii/ReadOutlookEmail/
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/6
Source: SEMqjw.exe, 00000001.00000003.343500561.0000000006F06000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/Y0C
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/g
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/$
Source: SEMqjw.exe, 00000001.00000003.343693589.0000000006F07000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/~
Source: SEMqjw.exe, 00000001.00000003.334591376.0000000006F17000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.334822512.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: SEMqjw.exe, 00000001.00000003.334752884.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comBibl
Source: SEMqjw.exe, 00000001.00000003.334623914.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comc
Source: SEMqjw.exe, 00000001.00000003.334591376.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comftw~
Source: SEMqjw.exe, 00000001.00000003.334752884.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comout
Source: SEMqjw.exe, 00000001.00000003.334752884.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comta
Source: SEMqjw.exe, 00000001.00000003.334875536.0000000006F17000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comut
Source: SEMqjw.exe, 00000001.00000003.338765915.0000000006F08000.00000004.00000001.sdmp String found in binary or memory: http://www.typography.nete
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://www.youtube.com
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: http://www.youtube.com6
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://aka.ms/qeqf5y
Source: auction[1].htm.1.dr String found in binary or memory: https://ams1-ib.adnxs.com/click?9kVCW86l0j8oKWRyYFXQPwAAACCF6xdAKClkcmBV0D_2RUJbzqXSP33X_J72WVxKPFvI
Source: de-ch[1].htm.1.dr String found in binary or memory: https://amzn.to/2TTxhNg
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.327274295.000000000084C000.00000004.00000001.sdmp String found in binary or memory: https://apis.google.com
Source: de-ch[1].htm.1.dr String found in binary or memory: https://apps.apple.com/ch/app/microsoft-news/id945416273?pt=80423&amp;ct=prime_footer&amp;mt=8
Source: auction[1].htm.1.dr String found in binary or memory: https://beap.gemini.yahoo.com/mbclk?bv=1.0.0&amp;es=7NOaYicGIS9mzf9WZ6UmQWmD_b1o38yjROgwgw_SraaThAdB
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://c21lg-a.media.net
Source: SEMqjw.exe, 00000001.00000003.412456929.00000000104F6000.00000004.00000001.sdmp String found in binary or memory: https://c21lg-a.media.netBidswitch_Video_DV360
Source: SEMqjw.exe, 00000001.00000003.403597481.0000000011332000.00000004.00000001.sdmp String found in binary or memory: https://c21lg-a.media.netbidNonStreamUrlWestOriginAPPLY_GOOGLE_RESTRICTIONhttps://contextual.media.n
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://c21lg-d.media.net/log?logid=kfk&evtid=cs&origin=1
Source: SEMqjw.exe, 00000001.00000003.403948838.0000000011319000.00000004.00000001.sdmp String found in binary or memory: https://c21lg-d.media.net/log?logid=kfk&evtid=cs&origin=1https://lg3.media.net/flping.php?pid=8POU9I
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://cdn-gase1-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://cdn-geuw1-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://cdn-guse1-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.404315489.00000000112C2000.00000004.00000001.sdmp String found in binary or memory: https://cdn-guse1-xch.media.net/AdExchange/rtbsspubhttps://cdneast2-xch.media.net/AdExchange/rtbsspu
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[2].json.1.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/googleData.json
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[2].json.1.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iab2Data.json
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[2].json.1.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iabData.json
Source: auction[1].htm.1.dr String found in binary or memory: https://cdn.flurry.com/adTemplates/templates/htmls/clips.html&quot;
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://cdneast2-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://cdnwest-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.327165050.0000000000817000.00000004.00000001.sdmp String found in binary or memory: https://chrome.google.com/webstore
Source: de-ch[1].htm.1.dr String found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_office&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_store&amp;m
Source: de-ch[1].htm.1.dr String found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_promotionalstripe_na
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://client-s.gateway.messenger.live.com
Source: SEMqjw.exe, 00000001.00000003.327165050.0000000000817000.00000004.00000001.sdmp String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: de-ch[1].htm.1.dr String found in binary or memory: https://clkde.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=24268818
Source: de-ch[1].htm.1.dr String found in binary or memory: https://clkde.tradedoubler.com/click?p=295926&amp;a=3064090&amp;g=24886692
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://content.googleapis.com
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net
Source: SEMqjw.exe, 00000001.00000003.396254465.000000000774F000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net&https=1&act=headerBid&prvReqId=237211076658808661635553328200&erTr=0&hl
Source: SEMqjw.exe, 00000001.00000003.381926841.000000000BC38000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.379865648.000000000BC38000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/checksync.php
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/checksync.php?
Source: SEMqjw.exe, 00000001.00000003.396254465.000000000774F000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
Source: SEMqjw.exe, 00000001.00000003.403827548.0000000011324000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/checksync.php?https://gusw2-xch.media.net/AdExchange/rtbsspubhttps://we
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/dtp.js?
Source: de-ch[1].htm.1.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172
Source: de-ch[1].htm.1.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=722878611&amp;size=306x271&amp;http
Source: de-ch[1].htm.1.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=858412214&amp;size=306x271&amp;http
Source: SEMqjw.exe, 00000001.00000003.434427130.000000000FFE2000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://c
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/rtbsmpubs.php(
Source: SEMqjw.exe, 00000001.00000003.396254465.000000000774F000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/rtbsmpubs.php?&gdpr=0&gdprconsent=1&usp_enf=1&usp_status=0&cid=8HBI57XI
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/ssapi/bids
Source: SEMqjw.exe, 00000001.00000003.379878489.000000000BC3C000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.381937585.000000000BC3C000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/ssapi/bidsBrightroll
Source: SEMqjw.exe, 00000001.00000003.401275370.0000000011349000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/ssapi/bidsENABLE_COOKIESYNC_FOR_SIGNATORIEShttps://lg3.media.net/rtblog
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/sse/bids(&
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/tc.js
Source: SEMqjw.exe, 00000001.00000003.401275370.0000000011349000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.net/tc.js_sCck_oxbGrp76st_orefpartnerdefault_l1HcSdlogUrls89LB79S0awlog203L
Source: SEMqjw.exe, 00000001.00000003.360310420.0000000010604000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.netlogid=kfk&evtid=agptslogFORCED_HIDE_BLOCKbidStreamUrlGcpEulogid=kfk&evti
Source: SEMqjw.exe, 00000001.00000003.399345658.0000000010604000.00000004.00000001.sdmp String found in binary or memory: https://contextual.media.netlogid=kfk&evtid=agptslogt.mnjs.stu.checkItemExistst.mnjs.stu.isObjectEmp
Source: auction[1].htm.1.dr String found in binary or memory: https://dcdn.adnxs.com/shftr/https%253A%252F%252Fcrcdn01.adnxs-simple.com%252Fcreative%252Fp%252F116
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://docs.google.com/
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://docs.google.com/U
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://drive.google.com/
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://drive.google.com/?usp=chrome_app
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://drive.google.com/drive/settings
Source: SEMqjw.exe, 00000001.00000003.327239535.0000000000821000.00000004.00000001.sdmp String found in binary or memory: https://drive.google.com/x
Source: SEMqjw.exe, 00000001.00000003.381926841.000000000BC38000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://east2-xch.media.net/AdExchange/rtbsapub
Source: SEMqjw.exe, 00000001.00000003.381926841.000000000BC38000.00000004.00000001.sdmp String found in binary or memory: https://east2-xch.media.net/AdExchange/rtbsspubhttps://west-xch.media.net/AdExchange/rtbsapub
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://east2-xch.media.net/AdExchange/rtbsspubty
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://feedback.googleusercontent.com
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.327274295.000000000084C000.00000004.00000001.sdmp String found in binary or memory: https://fonts.googleapis.com;
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com;
Source: SEMqjw.exe, 00000001.00000003.381789825.000000000C1C1000.00000004.00000001.sdmp, 55a804ab-e5c6-4b97-9319-86263d365d28[2].json.1.dr String found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://gusw1-xch.media.net/AdExchange/rtbsspubD
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://gusw2-xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://hangouts.google.com/
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://hblg.media.net
Source: SEMqjw.exe, 00000001.00000003.353670236.000000000775B000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.353638048.0000000007748000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.354457963.0000000007761000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://hblg.media.net/nerrping.php
Source: SEMqjw.exe, 00000001.00000003.404430564.00000000112B5000.00000004.00000001.sdmp String found in binary or memory: https://hblg.media.netlogid=kfk&evtid=avlogbidStreamUrlGcpEastplacement_type_idbidStreamUrlEastybnca
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://hbxlp.media.net
Source: SEMqjw.exe, 00000001.00000003.401275370.0000000011349000.00000004.00000001.sdmp String found in binary or memory: https://hbxlp.media.netbidStreamUrlEastOrigininmemorybidstorageCLOSE_AD_PREFERENCEprefetchproviderse
Source: SEMqjw.exe, 00000001.00000003.399345658.0000000010604000.00000004.00000001.sdmp String found in binary or memory: https://hbxlp.media.netbidStreamUrlEastOriginprovider-detailssspScriptResponseParsernativebidder-ada
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://hotmailproxy.betaplace.com/pm/v1.0/getheaders.aspx
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://hotmailproxy.msn.com/pm/v1.0/getheaders.aspx
Source: auction[1].htm.1.dr String found in binary or memory: https://ir2.beap.gemini.yahoo.com/mbcsc?bv=1.0.0&amp;es=hBs99_IGIS8vLzqLytxDuhL3v83fV1o2.leaGr72sUYM
Source: SEMqjw.exe, 00000001.00000003.413034395.00000000104AE000.00000004.00000001.sdmp String found in binary or memory: https://iurl-a.akamaihd.net/ybntag?medianet_bdata
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://iurl-a.akamaihd.net/ybntag?t.split
Source: SEMqjw.exe, 00000001.00000003.396240041.0000000007748000.00000004.00000001.sdmp, rtbsmpubs[1].js0.1.dr String found in binary or memory: https://iurl.media.net/dfp/ybntag?&cid=8CU157172&crid=722878611&size=300x250&requrl=$
Source: rtbsmpubs[1].js.1.dr String found in binary or memory: https://iurl.media.net/dfp/ybntag?&cid=8CU157172&crid=858412214&size=300x250&requrl=$
Source: SEMqjw.exe, 00000001.00000003.354395219.0000000007750000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.353700776.000000000F0D9000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.380010260.00000000077FF000.00000004.00000001.sdmp String found in binary or memory: https://lg3-a.akamaihd.net/nerrping.php
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/bping.php?
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/bqi.php
Source: SEMqjw.exe, 00000001.00000003.403597481.0000000011332000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/bqi.phpTCF_NO_LEGITIMATE_INTERESTlogheterogeneousdispatcher
Source: SEMqjw.exe, 00000001.00000003.412456929.00000000104F6000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/bqi.phppC3JHgSCqY8UHihgrvGr0A==INTERSCROLLER_NON_MOBILE_UGDAPPLY_GOOGLE_RESTRI
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/flping.php?pid=8POU9IV3U&prid=8PRVV7640
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/log?logid=kfk&evtid=popup
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/nerrping.php
Source: SEMqjw.exe, 00000001.00000003.379878489.000000000BC3C000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.381937585.000000000BC3C000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/nerrping.phphttps://contextual.media.net/dtp.js?
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.net/rtblog.php
Source: SEMqjw.exe, 00000001.00000003.409760948.0000000010656000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.netP#h
Source: SEMqjw.exe, 00000001.00000003.401275370.0000000011349000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.netSTOP_SENDING_PIIbidStreamUrlGcpApaclogid=kfk&evtid=alsspServerScriptUrllogid=kf
Source: SEMqjw.exe, 00000001.00000003.360310420.0000000010604000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.netlogid=kfk&evtid=adxplacement_type_idresponseParserUtildefaultBidderSetting
Source: SEMqjw.exe, 00000001.00000003.399345658.0000000010604000.00000004.00000001.sdmp String found in binary or memory: https://lg3.media.netlogid=kfk&evtid=adxplacement_type_idresponseParserUtildefaultBidderSetting000Xx
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;checkda=1&amp;ct=1635521020&amp;rver
Source: de-ch[1].htm.1.dr String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1635520899&amp;rver=7.0.6730.0&am
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1635521020&amp;rver=7.0.6730.0&am
Source: SEMqjw.exe, 00000001.00000003.387115854.000000000BBF1000.00000004.00000001.sdmp String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&ct=1635520899&rver=7.0.6730.0&wp=LBI&wreply=
Source: de-ch[1].htm.1.dr String found in binary or memory: https://login.live.com/logout.srf?ct=1635520900&amp;rver=7.0.6730.0&amp;lc=1033&amp;id=1184&amp;lru=
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://login.live.com/logout.srf?ct=1635521021&amp;rver=7.0.6730.0&amp;lc=1033&amp;id=1184&amp;lru=
Source: de-ch[1].htm.1.dr String found in binary or memory: https://login.live.com/me.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1635520899&amp;rver=7.0.6730.0&amp;w
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://login.live.com/me.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1635521020&amp;rver=7.0.6730.0&amp;w
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://login.skype.com/login/oauth/microsoft?client_id=738133
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://mail.google.com/mail
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://mail.google.com/mail/#settings
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://mem.gfx.ms/meversion/?partner=msn&amp;market=de-ch&quot;
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://navvy.media.net
Source: SEMqjw.exe, 00000001.00000003.360577666.00000000105C4000.00000004.00000001.sdmp String found in binary or memory: https://navvy.media.netsspServerStreamUrlHIDE_MOBILE_OVERLAYlogid=kfk&evtid=wopscommon-rendering-hel
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com/#qt=mru
Source: SEMqjw.exe, 00000001.00000003.380876915.000000000C087000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com/?qt=allmyphotos;Aktuelle
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com/?qt=mru;Aktuelle
Source: SEMqjw.exe, 00000001.00000003.380876915.000000000C087000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com/?qt=mru;OneDrive-App
Source: de-ch[1].htm.1.dr String found in binary or memory: https://onedrive.live.com/?wt.mc_id=oo_msn_msnhomepage_header
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com/about/en/download/
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com;Fotos
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com;OneDrive-App
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://onedrive.live.com?wt.mc_id=oo_msn_msnhomepage_header
Source: de-ch[1].htm.1.dr String found in binary or memory: https://outlook.com/
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://outlook.live.com/calendar
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://outlook.live.com/mail/
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://outlook.live.com/mail/deeplink/compose;Kalender
Source: de-ch[1].htm.1.dr String found in binary or memory: https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png&quot;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://play.google.com/store/apps/details?id=com.microsoft.amp.apps.bingnews&amp;hl=de-ch&amp;refer
Source: auction[1].htm.1.dr String found in binary or memory: https://policies.oath.com/us/en/oath/privacy/index.html
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://redirect.viglink.com/?key=29045bc04c786d46d362906f803b13a2&u=https://ebay.com$i
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://redirect.viglink.com?key=29045bc04c786d46d362906f803b13a2&u=https://amazon.com
Source: SEMqjw.exe, 00000001.00000003.367112705.000000000BDA7000.00000004.00000001.sdmp String found in binary or memory: https://s.mnet-ad.net
Source: SEMqjw.exe, 00000001.00000003.401275370.0000000011349000.00000004.00000001.sdmp String found in binary or memory: https://s.mnet-ad.netproviderInfoCollectionbidStreamUrlGcpWest21635520908118561226testbidder-adapter
Source: auction[1].htm.1.dr String found in binary or memory: https://s.yimg.com/lo/api/res/1.2/z3nJ.i0wJLUKE.PUO3hx1w--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
Source: de-ch[1].htm.1.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=dech-prime-hp-me
Source: de-ch[1].htm.1.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=dech-prime-hp-shoppingstripe-nav
Source: de-ch[1].htm.1.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=travelnavlink
Source: auction[1].htm.1.dr String found in binary or memory: https://srtb.msn.com:443/notify/viewedg?rid=d9125748a25347aeaba6c1d7a3e5ee7a&amp;r=infopane&amp;i=3&
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/de-ch/homepage/api/modules/cdnfetch&quot;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/519670.jpg
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAPYODK.img?h=368&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB12jAN6.img?h=27&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1aXBV1.img?h=27&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&amp;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&amp;w
Source: de-ch[1].htm.1.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&amp;w
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://support.skype.com
Source: de-ch[1].htm.1.dr String found in binary or memory: https://tools.applemediaservices.com/api/badges/download-on-the-app-store/black/de-de?&quot;
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://twitter.com
Source: de-ch[1].htm.1.dr String found in binary or memory: https://twitter.com/
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://twitter.com/i/notifications;Ich
Source: SEMqjw.exe, 00000001.00000003.387115854.000000000BBF1000.00000004.00000001.sdmp String found in binary or memory: https://web.vortex.data.msn.com/collect/v1
Source: de-ch[1].htm.1.dr, de-ch[1].htm0.1.dr String found in binary or memory: https://web.vortex.data.msn.com/collect/v1/t.gif?name=%27Ms.Webi.PageView%27&amp;ver=%272.1%27&amp;a
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://west-xch.media.net/AdExchange/rtbsapub
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://west-xch.media.net/AdExchange/rtbsspub
Source: iab2Data[2].json.1.dr String found in binary or memory: https://www.bidstack.com/privacy-policy/
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp String found in binary or memory: https://www.booking.com/index.nl.html?aid=1274296&Selected_currency=USD;lang=en;label=MSN-US-logo
Source: SEMqjw.exe String found in binary or memory: https://www.digicert.com/CPS0
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.ebay.ch/?mkcid=1&amp;mkrid=5222-53480-19255-0&amp;siteid=193&amp;campid=5338626668&amp;t
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/GryJ&
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com;
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/hangouts_
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/meetings1
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: SEMqjw.exe, 00000001.00000003.327211763.0000000000842000.00000004.00000001.sdmp String found in binary or memory: https://www.googleapis.com/auth/sierraShkJ
Source: SEMqjw.exe, 00000001.00000003.327283982.0000000000854000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com;
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/
Source: SEMqjw.exe, 00000001.00000003.381124808.000000000C1AB000.00000004.00000001.sdmp String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp&amp;ar=1&amp;item=deferred_page%3a1&amp;ignorejs=webcore%2fmodu
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp&amp;item=deferred_page%3a1&amp;ignorejs=webcore%2fmodules%2fjsb
Source: SEMqjw.exe, 00000001.00000003.468808339.0000000010075000.00000004.00000001.sdmp String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehphttps://www.msn.com/de-ch/?ocid=iehp
Source: SEMqjw.exe, 00000001.00000003.470599756.0000000010075000.00000004.00000001.sdmp String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehphttps://www.msn.com/de-ch/?ocid=iehp)
Source: SEMqjw.exe, 00000001.00000003.470599756.0000000010075000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.469438948.0000000010075000.00000004.00000001.sdmp, SEMqjw.exe, 00000001.00000003.469867513.0000000010075000.00000004.00000001.sdmp String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehphttps://www.msn.com/de-ch/?ocid=iehphttps://www.msn.com/de-ch/?o
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://www.msn.com/de-ch/homepage/api/modules/fetch&quot;
Source: de-ch[1].htm0.1.dr String found in binary or memory: https://www.msn.com/de-ch/homepage/api/pdp/updatepdpdata&quot;
Source: SEMqjw.exe, 00000001.00000003.469372887.000000001007E000.00000004.00000001.sdmp String found in binary or memory: https://www.msn.com/de-ch/https://www.msn.com/de-ch/https://www.msn.com/de-ch/
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/nachrichten/coronareisen
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/nachrichten/regional
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/christoph-fischbach-r%c3%bcckt-in-den-kantonsrat-nach/ar-AAQ5vJ
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/der-fall-brian-und-die-grenzen-des-schweizer-strafvollzugs/ar-A
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/die-stadt-will-mehr-polizistinnen-und-polizisten/ar-AAQ5uyR?oci
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/erste-booster-impfungen-im-kanton-z%c3%bcrich-ab-anfang-novembe
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/harte-pornografie-verschickt-mann-muss-schweiz-verlassen/ar-AAQ
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/nur-noch-einzelzimmer-in-den-beiden-unispital-neubauten/ar-AAQ3
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/sie-will-den-z%c3%bcrcherinnen-und-z%c3%bcrchern-den-besten-hum
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/sprayaktion-am-ber%c3%bchmtesten-kamin-z%c3%bcrichs/ar-AAQ2iU4?
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/staatsanw%c3%a4ltin-will-eine-verwahrung-mordfall-boppelsen-kom
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/z%c3%bcrcher-bordellbetreiber-freigesprochen/ar-AAQ0WVF?ocid=hp
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.msn.com/de-ch/sport?ocid=StripeOCID
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_QuickNote&auth=1
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_Recent&auth=1&wdorigin=msn
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_TopMenu&amp;auth=1&amp;wdorigin=msn
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.ricardo.ch/?utm_source=msn&amp;utm_medium=affiliate&amp;utm_campaign=msn_mestripe_logo_d
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.ricardo.ch/?utm_source=msn&amp;utm_medium=affiliate&amp;utm_campaign=msn_shop_de&amp;utm
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.skype.com/
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.skype.com/de
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.skype.com/de/download-skype
Source: SEMqjw.exe, 00000001.00000003.348026562.000000000BCDF000.00000004.00000001.sdmp, 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.skype.com/go/onedrivepromo.download?cm_mmc=MSFT_2390_MSN-com
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.skyscanner.net/flights?associateid=API_B2B_19305_00001&amp;vertical=custom&amp;pageType=
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.skyscanner.net/g/referrals/v1/cars/home?associateid=API_B2B_19305_00002
Source: iab2Data[2].json.1.dr String found in binary or memory: https://www.stroeer.com/fileadmin/com/StroeerDSP_deviceStorage.json
Source: iab2Data[2].json.1.dr String found in binary or memory: https://www.stroeer.de/konvergenz-konzepte/daten-technologien/stroeer-ssp/datenschutz-ssp.html
Source: 52-478955-68ddb2ab[1].js0.1.dr String found in binary or memory: https://www.sway.com/?WT.mc_id=MSN_site&utm_source=MSN&utm_medium=Topnav&utm_campaign=link;PowerPoin
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.tippsundtricks.co/gesundheit/finger-persoenlichkeit/?utm_campaign=DECH-Finger&amp;utm_so
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.tippsundtricks.co/lifehacks/dosenoeffner-falsch-benutzt/?utm_campaign=DECH-canopen&amp;u
Source: de-ch[1].htm.1.dr String found in binary or memory: https://www.tippsundtricks.co/sonstiges/rollstuhl-treppe-knopf/?utm_campaign=DECH-wheelchair&amp;utm
Source: auction[1].htm.1.dr String found in binary or memory: https://www.xandr.com/privacy/platform-privacy-policy
Source: SEMqjw.exe, 00000001.00000003.381926841.000000000BC38000.00000004.00000001.sdmp String found in binary or memory: https://xch.media.net/AdExchange/rtbsapubs
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://xch.media.net/AdExchange/rtbsapubs8
Source: SEMqjw.exe, 00000001.00000003.367282886.000000000BD7D000.00000004.00000001.sdmp String found in binary or memory: https://xch.media.net/AdExchange/rtbsspub
Source: SEMqjw.exe, 00000001.00000003.361191426.0000000010515000.00000004.00000001.sdmp String found in binary or memory: https://xch.media.net/AdExchange/rtbsspubhttps://gusw1-xch.media.net/AdExchange/rtbsspub
Source: unknown DNS traffic detected: queries for: w.nanweng.cn
Source: global traffic HTTP traffic detected: GET /cookieconsentpub/v1/geo/location HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: geolocation.onetrust.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /tag?o=6208086025961472&upapi=true HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: btloader.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /px.gif?ch=1&e=0.6358356914721921 HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ad-delivery.netConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico?ad=300x250&ad_box_=1&adnet=1&showad=1&size=250x250 HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ad.doubleclick.netConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /lo/api/res/1.2/z3nJ.i0wJLUKE.PUO3hx1w--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1pbmk7cT0xMDA-/https://s.yimg.com/av/ads/1634277746662-1414.jpg HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehpAccept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: s.yimg.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /tag?o=6208086025961472&upapi=true HTTP/1.1Accept: */*Referer: https://www.msn.com/de-ch/?ocid=iehp&AR=1Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: btloader.comIf-None-Match: "643eb1aad6ba3932ca744b96ffc00048"Connection: Keep-Alive
Source: unknown HTTPS traffic detected: 104.20.184.68:443 -> 192.168.2.6:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.7.139:443 -> 192.168.2.6:49808 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.69.19:443 -> 192.168.2.6:49815 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.230:443 -> 192.168.2.6:49814 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.22:443 -> 192.168.2.6:49826 version: TLS 1.2

System Summary:

barindex
Detected potential unwanted application
Source: SEMqjw.exe PE Siganture Subject Chain: CN=&#34;Anhui Shabake Network Technology Co., Ltd.&#34;, OU=&#232;&#191;&#144;&#232;&#144;&#165;, O=&#34;Anhui Shabake Network Technology Co., Ltd.&#34;, L=Ma'anshan, S=Anhui, C=CN, SERIALNUMBER=91320804MA1MKN9Q0G, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.1=Ma'anshan, OID.1.3.6.1.4.1.311.60.2.1.2=Anhui, OID.1.3.6.1.4.1.311.60.2.1.3=CN
Uses 32bit PE files
Source: SEMqjw.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Sample file is different than original file name gathered from version info
Source: SEMqjw.exe, 00000001.00000000.326352820.00000000005A2000.00000008.00020000.sdmp Binary or memory string: OriginalFilenameSEMzf vs SEMqjw.exe
Source: SEMqjw.exe Binary or memory string: OriginalFilenameSEMzf vs SEMqjw.exe
PE file contains strange resources
Source: SEMqjw.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SEMqjw.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: napinsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: pnrpnsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: nlaapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: winrnr.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: uianimation.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: windowscodecsext.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Section loaded: icm32.dll Jump to behavior
Source: SEMqjw.exe Static PE information: Section: UPX1 ZLIB complexity 0.990924092409
Source: SEMqjw.exe Metadefender: Detection: 28%
Source: SEMqjw.exe ReversingLabs: Detection: 82%
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Users\user\Desktop\SEMqjw.exe Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SEMqjw.exe Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link
Source: C:\Users\user\Desktop\SEMqjw.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Mutant created: \Sessions\1\BaseNamedObjects\ATL:MemData03EASEMqjw.exe
Source: C:\Users\user\Desktop\SEMqjw.exe File created: C:\Users\user\AppData\Roaming\GlobalMgr.db Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File created: C:\Users\user\AppData\Local\Temp\~DF15D6617A413C302B.TMP Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File written: C:\ProgramData\roundinfo.ini Jump to behavior
Source: classification engine Classification label: mal68.spyw.winEXE@1/62@32/7
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: SEMqjw.exe Static PE information: certificate valid
Source: initial sample Static PE information: section name: UPX0
Source: initial sample Static PE information: section name: UPX1

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\Desktop\SEMqjw.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Allocates memory with a write watch (potentially for evading sandboxes)
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 4640000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7050000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 71D0000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7970000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7AF0000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7B10000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7B50000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7B90000 memory commit | memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Memory allocated: 7BD0000 memory reserve | memory write watch Jump to behavior
Queries disk information (often used to detect virtual machines)
Source: C:\Users\user\Desktop\SEMqjw.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Process information queried: ProcessInformation Jump to behavior
Source: SEMqjw.exe, 00000001.00000003.364941452.000000001031B000.00000004.00000001.sdmp Binary or memory string: mnetActmnetTdmnetCIDmnet_hvmnet_dn,
Source: SEMqjw.exe, 00000001.00000003.456684897.0000000010020000.00000004.00000001.sdmp Binary or memory string: hideAttributionDivhideAttributionDivmnet-ad-preferenceload::AD_PREFERENCE

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\SEMqjw.exe Process queried: DebugPort Jump to behavior

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SEMqjw.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Queries the installation date of Windows
Source: C:\Users\user\Desktop\SEMqjw.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate Jump to behavior

Stealing of Sensitive Information:

barindex
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\SEMqjw.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\default\Secure Preferences Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs