Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Avira: detection malicious, Label: HEUR/AGEN.1202120 |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe | Avira: detection malicious, Label: HEUR/AGEN.1222458 |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | Avira: detection malicious, Label: HEUR/AGEN.1222458 |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe | Avira: detection malicious, Label: HEUR/AGEN.1213073 |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | Metadefender: Detection: 34% | Perma Link |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | ReversingLabs: Detection: 88% |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Metadefender: Detection: 22% | Perma Link |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | ReversingLabs: Detection: 76% |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe | Metadefender: Detection: 34% | Perma Link |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe | ReversingLabs: Detection: 76% |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe | Metadefender: Detection: 34% | Perma Link |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe | ReversingLabs: Detection: 88% |
Source: 33.0.cvtres.exe.400000.3.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.0.cvtres.exe.400000.0.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.0.cvtres.exe.400000.1.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.0.cvtres.exe.400000.4.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.5.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.1.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.0.cvtres.exe.400000.5.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.0.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.2.cvtres.exe.400000.0.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.2.cvtres.exe.400000.0.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.3.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.2.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 38.0.cvtres.exe.400000.4.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: 33.0.cvtres.exe.400000.2.unpack | Avira: Label: TR/ATRAPS.Gen |
Source: Yara match | File source: 33.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 33.2.cvtres.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0000001E.00000000.546097148.00007FF690D0D000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.429825827.000000000697A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000021.00000002.750831813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.430505540.0000000006AF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.548103464.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000000.540071330.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY |
Source: Yara match | File source: 00000023.00000002.755329501.000002A4FF769000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001C.00000002.753918438.0000027C1CA3C000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000024.00000000.550535309.00007FF690D0D000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY |
Source: Yara match | File source: 0000001E.00000003.549600394.000001DF76002000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2rVBokoc2C.exe PID: 7056, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: conhost.exe PID: 3944, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: wininit.exe PID: 7088, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: conhost.exe PID: 6316, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: wininit.exe PID: 6084, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\01Atodo\config.json, type: DROPPED |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: stratum+ssl://randomx.xmrig.com:443 |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: cryptonight/0 |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: -o, --url=URL URL of mining server |
Source: 2rVBokoc2C.exe, 00000000.00000003.429825827.000000000697A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: stratum+tcp:// |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: Usage: xmrig [OPTIONS] |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: XMRig 6.17.0 |
Source: global traffic | TCP traffic: 192.168.2.5:49818 -> 64.235.37.55:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"8aqxf1xtq3bbvaxy3ubmz2rmfaewvfjqsndqaukcq81zabivlj4xxavjnzflulvden21zttz1sjwfe555femgw7eaoni354","pass":"x","agent":"xmrig/6.17.0 (windows nt 10.0; win64; x64) libuv/1.43.0 msvc/2019","rigid":"xmrig","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","astrobwt","astrobwt/v2","ghostrider"]}}. |
Source: global traffic | TCP traffic: 192.168.2.5:49824 -> 64.235.37.55:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"8aqxf1xtq3bbvaxy3ubmz2rmfaewvfjqsndqaukcq81zabivlj4xxavjnzflulvden21zttz1sjwfe555femgw7eaoni354","pass":"x","agent":"xmrig/6.17.0 (windows nt 10.0; win64; x64) libuv/1.43.0 msvc/2019","rigid":"xmrig","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","astrobwt","astrobwt/v2","ghostrider"]}}. |
Source: global traffic | TCP traffic: 192.168.2.5:49829 -> 200.83.148.79:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"d06ed635-68f6-4e9a-955c-4899f5f57b9a","pass":"x","agent":"xmrig/5.11.1 (windows nt 10.0; win64; x64) libuv/1.34.0 gcc/8.2.0","algo":["cn/0","cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn-lite/0","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","rx/0","rx/wow","rx/loki","rx/arq","argon2/chukwa","argon2/wrkz","astrobwt"]}}. |
Source: global traffic | TCP traffic: 192.168.2.5:49844 -> 200.83.148.79:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"d06ed635-68f6-4e9a-955c-4899f5f57b9a","pass":"x","agent":"xmrig/5.11.1 (windows nt 10.0; win64; x64) libuv/1.34.0 gcc/8.2.0","algo":["cn/0","cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn-lite/0","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","rx/0","rx/wow","rx/loki","rx/arq","argon2/chukwa","argon2/wrkz","astrobwt"]}}. |
Source: | Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 2rVBokoc2C.exe |
Source: | Binary string: cvtres.pdbAQnS source: cvtres.exe, 00000021.00000003.612189049.0000000003120000.00000004.00001000.00020000.00000000.sdmp, svhproxy.33.dr |
Source: | Binary string: c:\Users\miki\Documents\Visual Studio 2012\Projects\DeskRindj\DeskRindj\obj\Debug\DeskRindj.pdb source: AudioClip.exe, 00000016.00000002.745607167.0000000000DF2000.00000002.00000001.01000000.0000000B.sdmp, AudioClip.exe, 00000020.00000002.529122119.0000000000C82000.00000002.00000001.01000000.00000011.sdmp, AudioClip.exe.22.dr, AudioClip.exe.0.dr |
Source: | Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 2rVBokoc2C.exe, 00000000.00000003.428989136.00000000065D0000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.0.dr |
Source: | Binary string: cvtres.pdb source: cvtres.exe, 00000021.00000003.612189049.0000000003120000.00000004.00001000.00020000.00000000.sdmp, svhproxy.33.dr |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BAA534 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, | 0_2_00BAA534 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BBB820 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW, | 0_2_00BBB820 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BCA928 FindFirstFileExA, | 0_2_00BCA928 |
Source: Traffic | Snort IDS: 2845601 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2020-11-20 2) 192.168.2.5:49818 -> 64.235.37.55:3333 |
Source: Traffic | Snort IDS: 2831812 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8) 192.168.2.5:49818 -> 64.235.37.55:3333 |
Source: Traffic | Snort IDS: 2845601 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2020-11-20 2) 192.168.2.5:49824 -> 64.235.37.55:3333 |
Source: Traffic | Snort IDS: 2831812 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8) 192.168.2.5:49824 -> 64.235.37.55:3333 |
Source: Traffic | Snort IDS: 2831812 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8) 192.168.2.5:49829 -> 200.83.148.79:3333 |
Source: Traffic | Snort IDS: 2831812 ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2018-07-16 8) 192.168.2.5:49844 -> 200.83.148.79:3333 |
Source: 2rVBokoc2C.exe, 00000000.00000003.428989136.00000000065D0000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 2rVBokoc2C.exe, 00000000.00000003.428989136.00000000065D0000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 2rVBokoc2C.exe, 00000000.00000003.428989136.00000000065D0000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 2rVBokoc2C.exe, 00000000.00000003.428989136.00000000065D0000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.0.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: svchost.exe, 0000001A.00000002.777725549.000001B77269C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: svchost.exe, 0000001A.00000002.775323442.000001B772600000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: AudioClip.exe, 00000016.00000002.756645107.000000000341B000.00000004.00000800.00020000.00000000.sdmp, AudioClip.exe, 00000020.00000002.529544830.000000000333B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://web1705.ath.cx/log.php |
Source: AudioClip.exe, 00000016.00000002.753618041.00000000016D0000.00000004.08000000.00040000.00000000.sdmp, AudioClip.exe, 00000016.00000002.756623219.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, AudioClip.exe, 00000016.00000002.756645107.000000000341B000.00000004.00000800.00020000.00000000.sdmp, AudioClip.exe, 00000020.00000002.529544830.000000000333B000.00000004.00000800.00020000.00000000.sdmp, AudioClip.exe, 00000020.00000002.529469024.0000000001360000.00000004.08000000.00040000.00000000.sdmp, AudioClip.exe, 00000020.00000002.529527884.0000000003311000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://web1705.ath.cx/log.phpM |
Source: services.exe, 0000000E.00000002.551526823.0000000003BC1000.00000004.00000800.00020000.00000000.sdmp, services.exe, 00000015.00000002.656226894.000000000364B000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000021.00000000.537477887.0000000000400000.00000040.00000400.00020000.00000000.sdmp, cvtres.exe, 00000026.00000000.549439536.0000000000400000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://RtlGetVersionntdll.dll |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp, wininit.exe, 0000001E.00000000.540071330.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, wininit.exe, 00000024.00000000.548103464.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, wininit.exe.0.dr | String found in binary or memory: https://xmrig.com/benchmark/%s |
Source: 2rVBokoc2C.exe, 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp, wininit.exe, 0000001E.00000000.540071330.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, wininit.exe, 00000024.00000000.548103464.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, wininit.exe.0.dr | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: wininit.exe.0.dr | String found in binary or memory: https://xmrig.com/wizard |
Source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: AudioClip.exe.0.dr, Program.cs | Long String: Length: 12553 |
Source: AudioClip.exe.22.dr, Program.cs | Long String: Length: 12553 |
Source: 22.2.AudioClip.exe.df0000.0.unpack, Program.cs | Long String: Length: 12553 |
Source: 22.0.AudioClip.exe.df0000.0.unpack, Program.cs | Long String: Length: 12553 |
Source: 32.2.AudioClip.exe.c80000.0.unpack, Program.cs | Long String: Length: 12553 |
Source: 32.0.AudioClip.exe.c80000.0.unpack, Program.cs | Long String: Length: 12553 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB65B6 | 0_2_00BB65B6 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BA8525 | 0_2_00BA8525 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB702F | 0_2_00BB702F |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BA404E | 0_2_00BA404E |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BAE1E0 | 0_2_00BAE1E0 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC0146 | 0_2_00BC0146 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BA326D | 0_2_00BA326D |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC457A | 0_2_00BC457A |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC055E | 0_2_00BC055E |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC47A9 | 0_2_00BC47A9 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BAE7E0 | 0_2_00BAE7E0 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BA27D4 | 0_2_00BA27D4 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB3731 | 0_2_00BB3731 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BAF8A8 | 0_2_00BAF8A8 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB39AC | 0_2_00BB39AC |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC0993 | 0_2_00BC0993 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB69EB | 0_2_00BB69EB |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BCCA20 | 0_2_00BCCA20 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB5BE7 | 0_2_00BB5BE7 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BB3CDD | 0_2_00BB3CDD |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BAEC54 | 0_2_00BAEC54 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BBFC4A | 0_2_00BBFC4A |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BADDAC | 0_2_00BADDAC |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BC0DC8 | 0_2_00BC0DC8 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BABD53 | 0_2_00BABD53 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BCCECE | 0_2_00BCCECE |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BD0FD4 | 0_2_00BD0FD4 |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Code function: 0_2_00BA5F0C | 0_2_00BA5F0C |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Code function: 14_2_00DE8DCD | 14_2_00DE8DCD |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Code function: 14_2_00C13A92 | 14_2_00C13A92 |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Code function: 14_2_05DD0747 | 14_2_05DD0747 |
Source: dump.pcap, type: PCAP | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/ |
Source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc |
Source: 36.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/ |
Source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc |
Source: 30.0.wininit.exe.7ff690540000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 00000000.00000003.430189255.0000000006A40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: 00000000.00000003.429825827.000000000697A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: 00000024.00000000.548103464.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: 00000024.00000000.548103464.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: 0000001E.00000000.540071330.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: 0000001E.00000000.540071330.00007FF6908C4000.00000002.00000001.01000000.00000010.sdmp, type: MEMORY | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: Process Memory Space: 2rVBokoc2C.exe PID: 7056, type: MEMORYSTR | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: Process Memory Space: 2rVBokoc2C.exe PID: 7056, type: MEMORYSTR | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: Process Memory Space: wininit.exe PID: 7088, type: MEMORYSTR | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: Process Memory Space: wininit.exe PID: 7088, type: MEMORYSTR | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: Process Memory Space: wininit.exe PID: 6084, type: MEMORYSTR | Matched rule: CoinMiner_Strings date = 2018-01-04, author = Florian Roth, description = Detects mining pool protocol string in Executable, score = https://minergate.com/faq/what-pool-address, modified = 2021-10-26, nodeepdive = |
Source: Process Memory Space: wininit.exe PID: 6084, type: MEMORYSTR | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth, description = Detects command line parameters often used by crypto mining software, reference = https://www.poolwatch.io/coin/monero, score = |
Source: Process Memory Space: cvtres.exe PID: 6584, type: MEMORYSTR | Matched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019 |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED | Matched rule: PUA_WIN_XMRIG_CryptoCoin_Miner_Dec20 date = 2020-12-31, hash1 = b6154d25b3aa3098f2cee790f5de5a727fc3549865a7aa2196579fe39a86de09, author = Florian Roth, description = Detects XMRIG crypto coin miners, reference = https://www.intezer.com/blog/research/new-golang-worm-drops-xmrig-miner-on-servers/ |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc |
Source: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe, type: DROPPED | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: unknown | Process created: C:\Users\user\Desktop\2rVBokoc2C.exe "C:\Users\user\Desktop\2rVBokoc2C.exe" | |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\install.vbs" | |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\del.bat" " | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 1 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\01Atodo\services.exe "C:\Users\user\AppData\Roaming\01Atodo\services.exe" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\delreg.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 2 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\killroaming.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\killstatrup.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\deltemp.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\start.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\services.exe services.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe AudioClip.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 2 | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\start.vbs" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\Replace32640.vbs" | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\start.bat" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\mavis9080.vbe" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe wininit.exe | |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe" | |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe \Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\start.bat" " | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe wininit.exe | |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe \Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | |
Source: C:\Windows\SysWOW64\taskkill.exe | Process created: C:\Windows\notepad.exe C:\Windows\notepad.exe" -c "C:\ProgramData\eWTBqYYAek\cfg | |
Source: C:\Users\user\Desktop\2rVBokoc2C.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\install.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\del.bat" " | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\taskkill.exe TASKKILL /IM wscript.exe /F | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\delreg.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 2 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\killroaming.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\killstatrup.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\deltemp.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\start.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\services.exe services.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe AudioClip.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\timeout.exe timeout /t 2 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\Replace32640.vbs" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\01Atodo\mavis9080.vbe" | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe \Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\wscript.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\start.bat" " | |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe \Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\01Atodo\start.bat" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe wininit.exe | |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | Process created: C:\Windows\notepad.exe C:\Windows\notepad.exe" -c "C:\ProgramData\eWTBqYYAek\cfg | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Roaming\01Atodo\wininit.exe wininit.exe | |
Source: C:\Windows\SysWOW64\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "wscript.exe") |
Source: C:\Windows\SysWOW64\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "wscript.exe") |
Source: C:\Windows\SysWOW64\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "wscript.exe") |
Source: C:\Windows\SysWOW64\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "wscript.exe") |
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "wscript.exe") |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll | |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | |
Source: C:\Users\user\AppData\Roaming\01Atodo\services.exe | Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll | |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp | |
Source: C:\Users\user\AppData\Roaming\01Atodo\AudioClip.exe | Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp | |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AudioClip.exe | Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dll | |