Source: C:\Notepad.exe | ReversingLabs: Detection: 84% |
Source: C:\Notepad.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Program Files (x86)\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Program Files (x86)\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Umbrella.flv.exe | ReversingLabs: Detection: 84% |
Source: C:\Umbrella.flv.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\AppData\Local\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\AppData\Local\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\Desktop\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\Desktop\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\Documents\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\Documents\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Users\user\Favorites\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Users\user\Favorites\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\Windows\SysWOW64\Explower.exe | ReversingLabs: Detection: 84% |
Source: C:\Windows\SysWOW64\Explower.exe | Virustotal: Detection: 71% | Perma Link |
Source: C:\system.exe | ReversingLabs: Detection: 84% |
Source: C:\system.exe | Virustotal: Detection: 71% | Perma Link |
Source: 7tjt3u68PZ.exe, 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: \autorun.inf |
Source: 7tjt3u68PZ.exe, 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: [autorun] |
Source: 7tjt3u68PZ.exe, 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: autorun.inf |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: \autorun.inf |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: [autorun] |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: autorun.inf$O]k |
Source: 7tjt3u68PZ.exe | Binary or memory string: \autorun.inf |
Source: 7tjt3u68PZ.exe | Binary or memory string: [autorun] |
Source: 7tjt3u68PZ.exe | Binary or memory string: autorun.inf |
Source: system.exe.0.dr | Binary or memory string: \autorun.inf |
Source: system.exe.0.dr | Binary or memory string: [autorun] |
Source: system.exe.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe2.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe2.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe2.0.dr | Binary or memory string: autorun.inf |
Source: Umbrella.flv.exe.0.dr | Binary or memory string: \autorun.inf |
Source: Umbrella.flv.exe.0.dr | Binary or memory string: [autorun] |
Source: Umbrella.flv.exe.0.dr | Binary or memory string: autorun.inf |
Source: Notepad.exe.0.dr | Binary or memory string: \autorun.inf |
Source: Notepad.exe.0.dr | Binary or memory string: [autorun] |
Source: Notepad.exe.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe8.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe8.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe8.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe1.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe1.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe1.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe4.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe4.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe4.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe3.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe3.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe3.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe7.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe7.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe7.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe6.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe6.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe6.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe0.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe0.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe0.0.dr | Binary or memory string: autorun.inf |
Source: Explower.exe5.0.dr | Binary or memory string: \autorun.inf |
Source: Explower.exe5.0.dr | Binary or memory string: [autorun] |
Source: Explower.exe5.0.dr | Binary or memory string: autorun.inf |
Source: autorun.inf.0.dr | Binary or memory string: [autorun] |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\system.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\system.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\system.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\system.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\system.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\system.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\system.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Detects NjRAT / Bladabindi Author: ditekSHen |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: 7tjt3u68PZ.exe, type: SAMPLE | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: 0.0.7tjt3u68PZ.exe.8b0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: 00000000.00000000.1664656287.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Program Files (x86)\Explower.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Notepad.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\system.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\system.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\system.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\system.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\system.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\system.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\system.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04 |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Umbrella.flv.exe, type: DROPPED | Matched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ifmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasmontr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mfc42u.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: authfwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcmonitor.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3cfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dot3api.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: onex.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: eappprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: fwcfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: hnetmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netshell.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netsetupapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: netiohlp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: httpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: polstore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winipsec.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: nshwfp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cabinet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2pnetsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: p2p.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rpcnsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: whhelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlancfg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wlanapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wshelper.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wevtapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: peerdistsh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wcmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mobilenetworking.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: ktmw32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: mprmsg.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1270000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2F10000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1270000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 5F10000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 6F10000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 7140000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 8140000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 8490000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: AD50000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: BD50000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: C1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: D1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: E1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: F1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 101E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 111E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: F2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 121E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 102E0000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 131E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 141E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 151E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 161E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 171E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 181E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 191E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1A1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1B1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1C1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1D1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1E1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1F1E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 201E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: C350000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 10BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 11BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 12BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 13BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 14BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 15BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 16BF0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 211E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 221E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 231E0000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 243F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 253F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 263F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 273F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 283F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 293F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2A3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2B3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2C3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2D3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2E3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 2F3F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 303F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 313F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 323F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 333F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: D350000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: D450000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 102E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 112E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 122E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 132E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 142E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 152E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 162E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 172E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 182E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 192E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1A2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1B2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1C2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1D2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1E2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 1F2E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 202E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 212E0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: FA60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 10A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 11A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 12A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 13A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 14A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 15A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 16A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 17A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 18A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 19A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 10AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 11AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 12AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 13AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 14AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 18AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 19AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 17AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 12BE0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 15AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 16AA0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\7tjt3u68PZ.exe | Memory allocated: 13BE0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: 9B0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: 26D0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe | Memory allocated: 9B0000 memory commit | memory reserve | memory write watch | Jump to behavior |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:31 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 21:59:13 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:44 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 03:22:09 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:43 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:23 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:14:40 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:01:57 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 06:06:21 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 00:52:47 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:25 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:35 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 04:59:23 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:37:10 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:41 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:47 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 01:16:46 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:05 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:36 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:00 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 23:36:34 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:34 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:01:59 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:04:18 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:10 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:16 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:07:07 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:41 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000003.00000002.1820164575.00000000026D1000.00000004.00000800.00020000.00000000.sdmp, Explower.exe, 00000003.00000002.1823617634.0000000004ACB000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: Program Manager |
Source: 7tjt3u68PZ.exe, system.exe.0.dr, Explower.exe2.0.dr, Umbrella.flv.exe.0.dr, Notepad.exe.0.dr, Explower.exe8.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr | Binary or memory string: ProgMan |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:32 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 03:49:43 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 05:05:09 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:40 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 21:53:57 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:05:08 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:32:37 - Program Manager |
Source: 7tjt3u68PZ.exe, system.exe.0.dr, Explower.exe2.0.dr, Umbrella.flv.exe.0.dr, Notepad.exe.0.dr, Explower.exe8.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr | Binary or memory string: Shell_traywnd+MostrarBarraDeTarefas |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:48 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/11 | 09:09:59 - Program Manager |
Source: Explower.exe, 00000003.00000002.1823617634.0000000004ACB000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: dProgram Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:24 - Program Manager |
Source: 7tjt3u68PZ.exe, system.exe.0.dr, Explower.exe2.0.dr, Umbrella.flv.exe.0.dr, Notepad.exe.0.dr, Explower.exe8.0.dr, Explower.exe.0.dr, Explower.exe1.0.dr, Explower.exe4.0.dr, Explower.exe3.0.dr, Explower.exe7.0.dr, Explower.exe6.0.dr, Explower.exe0.0.dr | Binary or memory string: Shell_TrayWnd |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:04:56 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:42 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:08 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:13 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:07 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:37 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:17 - Program Manager |
Source: Explower.exe, 00000003.00000002.1820164575.00000000026D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: ledProgram Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:11 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:02:21 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:29 - Program Manager |
Source: 7tjt3u68PZ.exe, 00000000.00000002.4123213231.0000000002F11000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 24/09/10 | 20:03:09 - Program Manager |