Source: 1.0.cvtres.exe.400000.0.unpack | Avira: Label: TR/Spy.Gen8 |
Source: 1.0.cvtres.exe.400000.3.unpack | Avira: Label: TR/Spy.Gen8 |
Source: 1.2.cvtres.exe.400000.0.unpack | Avira: Label: TR/Spy.Gen8 |
Source: 1.0.cvtres.exe.400000.4.unpack | Avira: Label: TR/Spy.Gen8 |
Source: 1.0.cvtres.exe.400000.2.unpack | Avira: Label: TR/Spy.Gen8 |
Source: 1.0.cvtres.exe.400000.1.unpack | Avira: Label: TR/Spy.Gen8 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_01766780 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_0176C964 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_0176D42D |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_0176D7FC |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_017667A4 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_0176678C |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_0176CA0A |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:HTTP/1.1 |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cDJlhu.com |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0c |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: cvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://mail.rematinvest.ro |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp.digicert.com0O |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: cvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://rematinvest.ro |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org% |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org%%startupfolder% |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: DHL_119040 receipt document,pdf.exe | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www |
Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE | Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen |
Source: 1.0.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.0.cvtres.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.2.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.0.cvtres.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.0.cvtres.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.0.cvtres.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.cs | Large array initialization: .cctor: array initializer size 11646 |
Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01768998 | 0_2_01768998 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01762580 | 0_2_01762580 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01769CE0 | 0_2_01769CE0 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01766B48 | 0_2_01766B48 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01761B48 | 0_2_01761B48 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176BF18 | 0_2_0176BF18 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176DB18 | 0_2_0176DB18 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_017612B0 | 0_2_017612B0 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01762570 | 0_2_01762570 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01767550 | 0_2_01767550 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176A148 | 0_2_0176A148 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176C521 | 0_2_0176C521 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176A12C | 0_2_0176A12C |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176A11E | 0_2_0176A11E |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176350D | 0_2_0176350D |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01768989 | 0_2_01768989 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01763440 | 0_2_01763440 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01767840 | 0_2_01767840 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01760448 | 0_2_01760448 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01767829 | 0_2_01767829 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01768818 | 0_2_01768818 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176040F | 0_2_0176040F |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176A0E8 | 0_2_0176A0E8 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01769CD0 | 0_2_01769CD0 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01763350 | 0_2_01763350 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01761B38 | 0_2_01761B38 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01766B39 | 0_2_01766B39 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176BF08 | 0_2_0176BF08 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_0176DB08 | 0_2_0176DB08 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01766FE8 | 0_2_01766FE8 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01766FD8 | 0_2_01766FD8 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01761224 | 0_2_01761224 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01765620 | 0_2_01765620 |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Code function: 0_2_01765610 | 0_2_01765610 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Code function: 1_2_04DEF080 | 1_2_04DEF080 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Code function: 1_2_04DEF3C8 | 1_2_04DEF3C8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Code function: 1_2_04DE6120 | 1_2_04DE6120 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Code function: 1_2_09570040 | 1_2_09570040 |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455149585.00000000032D2000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameHVABjdWatjolCFUDdeTjpFHzNrt.exe4 vs DHL_119040 receipt document,pdf.exe |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.452824150.0000000000F3D000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameNBCBNCXHJKDJHD23442.exeH vs DHL_119040 receipt document,pdf.exe |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameHVABjdWatjolCFUDdeTjpFHzNrt.exe4 vs DHL_119040 receipt document,pdf.exe |
Source: DHL_119040 receipt document,pdf.exe | Binary or memory string: OriginalFilenameNBCBNCXHJKDJHD23442.exeH vs DHL_119040 receipt document,pdf.exe |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe "C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe" | |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Jump to behavior |
Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 1.0.cvtres.exe.400000.3.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 1.0.cvtres.exe.400000.3.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 1.2.cvtres.exe.400000.0.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 1.2.cvtres.exe.400000.0.unpack, A/F1.cs | Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455840866.0000000004AC5000.00000004.00000800.00020000.00000000.sdmp, DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %GiEQgaEQeMUQ |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %kWjFEAAAGiEQgaEQeMUQAAAaIRC |
Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %/gEsBhYqHwoTCwARCx3+ASwHCBYzGh4TCwARCxv+ASwGFhMEHBMLABELHwr+ASwgEQQNAgd0DAAAGxEECBZvuQEAChMGEQYWM1cWKh8LEwsAEQse/gEsFQIgAAAAgCj0AgAGKOoAAAYmHwkTCwARCxj+ASwGAxRRGRMLABELF/4BLAMYEwsAEQsW/gEsAxcTCwARCx8L/gEsAisFOCX///8RBBEG1hMECBEG2gwHdAwAABsWCRnaKLoBAAoRBBIAKM8AAAY5SP///wMoowAACgd0DAAAGxYGb9YAAApREQQGOxQBAAARBAbaEwcEEQcX2hfWjS8AAAFRFNCCAAABKBQAAAooVQIABhuNBwAAARMIEQgWBygRAAAKohEIFwaMUQAAAaIRCBgEUKIRCBkWjFEAAAGiEQgaEQeMUQAAAaIRCBM |
Source: cvtres.exe, 00000001.00000002.715207118.000000000A020000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 436000 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 438000 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 8C5008 | Jump to behavior |
Source: DHL_119040 receipt document,pdf.exe, u206a????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32') |
Source: DHL_119040 receipt document,pdf.exe, u200f????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll') |
Source: 0.0.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u206a????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32') |
Source: 0.0.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u200f????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll') |
Source: 0.2.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u206a????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32') |
Source: 0.2.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u200f????????????????????????????????????????.cs | Reference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll') |
Source: 1.0.cvtres.exe.400000.0.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 1.0.cvtres.exe.400000.3.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 1.2.cvtres.exe.400000.0.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 1.0.cvtres.exe.400000.4.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 1.0.cvtres.exe.400000.2.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 1.0.cvtres.exe.400000.1.unpack, A/E1.cs | Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe | Queries volume information: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.712487104.0000000006B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: DHL_119040 receipt document,pdf.exe PID: 7080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cvtres.exe PID: 7116, type: MEMORYSTR |
Source: Yara match | File source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.712487104.0000000006B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: DHL_119040 receipt document,pdf.exe PID: 7080, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: cvtres.exe PID: 7116, type: MEMORYSTR |