Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: http://www.7dkjhk.com/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.hubyazilim.com/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.genuineinsights.cloud/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.ladybillplanet.com/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.energybig.xyz | Avira URL Cloud: Label: malware |
Source: http://www.octohoki.net/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.octohoki.net | Avira URL Cloud: Label: malware |
Source: http://www.genuineinsights.cloud | Avira URL Cloud: Label: phishing |
Source: http://www.wenzid4.top/ghii/ | Avira URL Cloud: Label: malware |
Source: http://www.wenzid4.top/ghii/?XdZ7vzmO=MOY5/0rZkCSn1x8B5kGxcu4kjN12BC26NMBU4rUAiJ09dU/WDm+Fx0Du9tK3DtQGeLOXEwxSHBLi0tUrRAF6AjHy/cvLKIMIEQ==&IM4=qwV6CUVoIAuPXv | Avira URL Cloud: Label: malware |
Source: http://www.energybig.xyz/ghii/ | Avira URL Cloud: Label: malware |
Source: | Binary string: explorer.pdbUGP source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\xampp\htdocs\033f3715fd5f4d1cb9aa179eaa7531bc\Loader\Release\Loader.pdb source: Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe, 00000000.00000002.259315149.0000000002877000.00000004.00000020.00020000.00000000.sdmp, Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe, 00000000.00000002.259072728.000000000040C000.00000004.00000001.01000000.00000003.sdmp, dlcmto.exe, 00000001.00000002.255689187.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, dlcmto.exe, 00000001.00000000.248339390.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, dlcmto.exe, 00000003.00000002.297879282.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, explorer.exe, 00000009.00000002.518882230.0000000004B23000.00000004.10000000.00040000.00000000.sdmp, nsh9334.tmp.0.dr, dlcmto.exe.0.dr |
Source: | Binary string: wntdll.pdbUGP source: dlcmto.exe, 00000001.00000003.252021778.000000001A7D0000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000001.00000003.252292362.000000001A960000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000012CF000.00000040.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.255304096.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.253006768.0000000000E03000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.299557903.0000000004644000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.297581273.0000000004456000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000048FF000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000047E0000.00000040.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: dlcmto.exe, 00000001.00000003.252021778.000000001A7D0000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000001.00000003.252292362.000000001A960000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000012CF000.00000040.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.255304096.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.253006768.0000000000E03000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.299557903.0000000004644000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.297581273.0000000004456000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000048FF000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000047E0000.00000040.00001000.00020000.00000000.sdmp |
Source: | Binary string: explorer.pdb source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405D74 |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_0040699E FindFirstFileW,FindClose, | 0_2_0040699E |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_0040290B FindFirstFileW, | 0_2_0040290B |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01197D84 FindFirstFileExW,_free,FindNextFileW,_free,FindClose,_free, | 1_2_01197D84 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01197CD3 _free,_free,FindFirstFileExW,_free, | 1_2_01197CD3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01197D84 FindFirstFileExW,_free,FindNextFileW,_free,FindClose,_free, | 3_2_01197D84 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01197CD3 _free,_free,FindFirstFileExW,_free, | 3_2_01197CD3 |
Source: Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.7dkjhk.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.7dkjhk.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.assilajamiart.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.assilajamiart.com/ghii/ |
Source: explorer.exe, 00000004.00000003.273579499.000000000F276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526428626.000000000F270000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.268677971.000000000F276000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bemmulher.online |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bemmulher.online/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.cutgang.net |
Source: explorer.exe, 00000009.00000002.519305983.000000000737D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.cutgang.net/Bj |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.cutgang.net/ghii/ |
Source: explorer.exe, 00000009.00000002.519305983.000000000737D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.cutgang.net/ghii/?XdZ7vzmO=ZjEpLe7oxQ70uLnf6hiyuc6pu0EMckSA0PTIEH8mULBl4PD4NIfksCJCZa9jgf |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.de-nagel.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.de-nagel.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.energybig.xyz |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.energybig.xyz/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.fluxgreenn.space |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.fluxgreenn.space/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.genuineinsights.cloud |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.genuineinsights.cloud/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.hubyazilim.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.hubyazilim.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ixirwholesale.xyz |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ixirwholesale.xyz/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ladybillplanet.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ladybillplanet.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.nortonseecurity.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.nortonseecurity.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.octohoki.net |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.octohoki.net/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.sem-jobs.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.sem-jobs.com/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.wenzid4.top |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.wenzid4.top/ghii/ |
Source: explorer.exe, 00000004.00000003.473047459.000000000F52A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.yeah-go.com |
Source: explorer.exe, 00000004.00000002.526996565.000000000F52A000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.yeah-go.com/ghii/ |
Source: -912K03JO.9.dr | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: -912K03JO.9.dr | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: -912K03JO.9.dr | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: -912K03JO.9.dr | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command= |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://search.yahoo.com?fr=crmas_sfp |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf |
Source: explorer.exe, 00000009.00000003.353036746.0000000007371000.00000004.00000020.00020000.00000000.sdmp, -912K03JO.9.dr | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_00405809 |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403640 |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00406D5F | 0_2_00406D5F |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_0119EDCC | 1_2_0119EDCC |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F08B7 | 1_2_009F08B7 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F0A1F | 1_2_009F0A1F |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_00405803 | 3_2_00405803 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_00403883 | 3_2_00403883 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_00401B60 | 3_2_00401B60 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_00421B3F | 3_2_00421B3F |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_00401C70 | 3_2_00401C70 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_004055E2 | 3_2_004055E2 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_004055E3 | 3_2_004055E3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_004206D3 | 3_2_004206D3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_004017C0 | 3_2_004017C0 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0040BFCE | 3_2_0040BFCE |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0040BFD3 | 3_2_0040BFD3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0040BF8D | 3_2_0040BF8D |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_004017B3 | 3_2_004017B3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0119EDCC | 3_2_0119EDCC |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E5F3 NtCreateFile, | 3_2_0041E5F3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E6A3 NtReadFile, | 3_2_0041E6A3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E723 NtClose, | 3_2_0041E723 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E7D3 NtAllocateVirtualMemory, | 3_2_0041E7D3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E5ED NtCreateFile, | 3_2_0041E5ED |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E69D NtReadFile, | 3_2_0041E69D |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0041E7CD NtAllocateVirtualMemory, | 3_2_0041E7CD |
Source: unknown | Process created: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Process created: C:\Users\user\AppData\Local\Temp\dlcmto.exe "C:\Users\user\AppData\Local\Temp\dlcmto.exe" C:\Users\user\AppData\Local\Temp\osqafruepl.xf | |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Process created: C:\Users\user\AppData\Local\Temp\dlcmto.exe C:\Users\user\AppData\Local\Temp\dlcmto.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\autoconv.exe C:\Windows\SysWOW64\autoconv.exe | |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe | |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Process created: C:\Users\user\AppData\Local\Temp\dlcmto.exe "C:\Users\user\AppData\Local\Temp\dlcmto.exe" C:\Users\user\AppData\Local\Temp\osqafruepl.xf | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Process created: C:\Users\user\AppData\Local\Temp\dlcmto.exe C:\Users\user\AppData\Local\Temp\dlcmto.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\autoconv.exe C:\Windows\SysWOW64\autoconv.exe | Jump to behavior |
Source: C:\Windows\explorer.exe | Process created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403640 |
Source: | Binary string: explorer.pdbUGP source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\xampp\htdocs\033f3715fd5f4d1cb9aa179eaa7531bc\Loader\Release\Loader.pdb source: Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe, 00000000.00000002.259315149.0000000002877000.00000004.00000020.00020000.00000000.sdmp, Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe, 00000000.00000002.259072728.000000000040C000.00000004.00000001.01000000.00000003.sdmp, dlcmto.exe, 00000001.00000002.255689187.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, dlcmto.exe, 00000001.00000000.248339390.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, dlcmto.exe, 00000003.00000002.297879282.00000000011A0000.00000002.00000001.01000000.00000004.sdmp, explorer.exe, 00000009.00000002.518882230.0000000004B23000.00000004.10000000.00040000.00000000.sdmp, nsh9334.tmp.0.dr, dlcmto.exe.0.dr |
Source: | Binary string: wntdll.pdbUGP source: dlcmto.exe, 00000001.00000003.252021778.000000001A7D0000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000001.00000003.252292362.000000001A960000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000012CF000.00000040.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.255304096.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.253006768.0000000000E03000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.299557903.0000000004644000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.297581273.0000000004456000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000048FF000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000047E0000.00000040.00001000.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: dlcmto.exe, 00000001.00000003.252021778.000000001A7D0000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000001.00000003.252292362.000000001A960000.00000004.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000012CF000.00000040.00001000.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.255304096.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.253006768.0000000000E03000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000002.297907577.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.299557903.0000000004644000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.297581273.0000000004456000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000048FF000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.517484627.00000000047E0000.00000040.00001000.00020000.00000000.sdmp |
Source: | Binary string: explorer.pdb source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405D74 |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_0040699E FindFirstFileW,FindClose, | 0_2_0040699E |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_0040290B FindFirstFileW, | 0_2_0040290B |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01197D84 FindFirstFileExW,_free,FindNextFileW,_free,FindClose,_free, | 1_2_01197D84 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01197CD3 _free,_free,FindFirstFileExW,_free, | 1_2_01197CD3 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01197D84 FindFirstFileExW,_free,FindNextFileW,_free,FindClose,_free, | 3_2_01197D84 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01197CD3 _free,_free,FindFirstFileExW,_free, | 3_2_01197CD3 |
Source: explorer.exe, 00000004.00000002.524345410.00000000090D8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z, |
Source: explorer.exe, 00000004.00000003.476169113.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.524345410.00000000090D8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW\A%SystemRoot%\system32\mswsock.dllts\AppTiles\StoreBadgeLogo.pngU |
Source: explorer.exe, 00000004.00000003.475534026.000000000F2C3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.477026590.000000000F305000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.526542951.000000000F306000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: explorer.exe, 00000004.00000003.272248939.0000000007166000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}> |
Source: explorer.exe, 00000004.00000002.524345410.00000000090D8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000 |
Source: explorer.exe, 00000004.00000002.524345410.00000000090D8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i, |
Source: explorer.exe, 00000004.00000000.267285936.0000000008FD3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG |
Source: explorer.exe, 00000004.00000003.475970402.000000000509E000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9' |
Source: explorer.exe, 00000004.00000000.267285936.0000000008FD3000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01192D34 mov eax, dword ptr fs:[00000030h] | 1_2_01192D34 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01196ECB mov eax, dword ptr fs:[00000030h] | 1_2_01196ECB |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F005F mov eax, dword ptr fs:[00000030h] | 1_2_009F005F |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F0109 mov eax, dword ptr fs:[00000030h] | 1_2_009F0109 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F013E mov eax, dword ptr fs:[00000030h] | 1_2_009F013E |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_009F017B mov eax, dword ptr fs:[00000030h] | 1_2_009F017B |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01192D34 mov eax, dword ptr fs:[00000030h] | 3_2_01192D34 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01196ECB mov eax, dword ptr fs:[00000030h] | 3_2_01196ECB |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01191B25 SetUnhandledExceptionFilter, | 1_2_01191B25 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01196515 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_01196515 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_0119202D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 1_2_0119202D |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 1_2_01191B31 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 1_2_01191B31 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_0119202D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_0119202D |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01191B31 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_01191B31 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01191B25 SetUnhandledExceptionFilter, | 3_2_01191B25 |
Source: C:\Users\user\AppData\Local\Temp\dlcmto.exe | Code function: 3_2_01196515 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_01196515 |
Source: explorer.exe, 00000004.00000002.514818678.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.259143664.0000000001980000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Program ManagerT7<=ge |
Source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: explorer.exe, 00000004.00000002.514818678.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.259143664.0000000001980000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progman |
Source: dlcmto.exe, 00000003.00000002.298566027.0000000002C80000.00000040.10000000.00040000.00000000.sdmp, dlcmto.exe, 00000003.00000003.295506856.0000000003001000.00000004.00000020.00020000.00000000.sdmp, dlcmto.exe, 00000003.00000003.294435514.0000000002C80000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Microsoft-Reserved-24C26ACC-DE62-4303-88AD-6CD4F1447F18SecurityConfigureWindowsPasswordsProxy DesktopProgmanSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonShellSoftware\Microsoft\Windows NT\CurrentVersion\Winlogon\AlternateShells\AvailableShells |
Source: explorer.exe, 00000004.00000002.513559478.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.258690717.0000000001378000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CProgmanile |
Source: explorer.exe, 00000004.00000002.514818678.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.259143664.0000000001980000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\Halkbank_Ekstre_20191102_073809_405251-PDF.com.exe | Code function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403640 |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.dlcmto.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.297238970.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297682899.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517154599.0000000004450000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.297724728.0000000000FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.515846426.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.517245778.0000000004480000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |