Windows Analysis Report
PumpBot.exe

Overview

General Information

Sample name: PumpBot.exe
Analysis ID: 1545732
MD5: 6a0748cef7672d8c10da160a9f9d3e7c
SHA1: 41e707866b91bf5509091b0949fccaa8cbe73908
SHA256: b8cf4fc945a0c0401f6931467f4ddf2f58a017e932a87b3ddaa0bb925ef78231
Tags: exeuser-500mk500
Infos:

Detection

Score: 27
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

Found pyInstaller with non standard icon
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

Source: PumpBot.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1t 7 Feb 2023built on: Thu Feb 9 15:27:40 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: libcrypto-1_1.dll.0.dr
Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: PumpBot.exe, 00000000.00000003.2125146329.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2146180642.00007FFDA5471000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2145981819.00007FFDA372B000.00000002.00000001.01000000.00000007.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: libssl-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: PumpBot.exe, 00000003.00000002.2145582822.00007FFD9456F000.00000002.00000001.01000000.00000004.sdmp, python310.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2145981819.00007FFDA372B000.00000002.00000001.01000000.00000007.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2146090661.00007FFDA433D000.00000002.00000001.01000000.00000006.sdmp, _bz2.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: _ssl.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: libssl-1_1.dll.0.dr
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1000A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE69E0 FindFirstFileExW,FindClose, 0_2_00007FF7A0FE69E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1000A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 3_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 3_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FE69E0 FindFirstFileExW,FindClose, 3_2_00007FF7A0FE69E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 3_2_00007FF7A0FF6878
Source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.co
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.cot
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: unicodedata.pyd.0.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr String found in binary or memory: http://ocsp.digicert.com0
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr String found in binary or memory: http://ocsp.digicert.com0A
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://ocsp.digicert.com0C
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr String found in binary or memory: http://ocsp.digicert.com0X
Source: PumpBot.exe, 00000000.00000003.2129857475.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A96000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2127164174.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, python310.dll.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr String found in binary or memory: http://www.digicert.com/CPS0
Source: base_library.zip.0.dr String found in binary or memory: http://www.robotstxt.org/norobots-rfc.txt
Source: PumpBot.exe, 00000003.00000003.2136027886.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132744160.0000027395FE3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138908226.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133468215.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132655496.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2137615624.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2143735264.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2136131181.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138196238.0000027395FF9000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2135642576.0000027395FF5000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2134954861.0000027395FD3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132757422.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133579000.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: PumpBot.exe, 00000003.00000003.2133187866.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132655496.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2143869403.000002739608C000.00000004.00001000.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132757422.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2134667028.0000027395FB7000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133468215.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133579000.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: PumpBot.exe, 00000003.00000003.2133579000.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: PumpBot.exe, 00000003.00000003.2136027886.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132744160.0000027395FE3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138908226.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133468215.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132655496.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2137615624.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2143735264.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2136131181.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138196238.0000027395FF9000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2135642576.0000027395FF5000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2134954861.0000027395FD3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132757422.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133579000.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: PumpBot.exe, 00000003.00000003.2136027886.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132744160.0000027395FE3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138908226.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133468215.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132655496.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133298257.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133187866.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2137615624.0000027395FF6000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133063077.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2143735264.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2136131181.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2138196238.0000027395FF9000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2135642576.0000027395FF5000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2134954861.0000027395FD3000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132757422.0000027395FDA000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2132799099.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2133579000.0000027395FB4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: base_library.zip.0.dr String found in binary or memory: https://mahler:8092/site-updates.py
Source: PumpBot.exe, 00000003.00000002.2145582822.00007FFD9456F000.00000002.00000001.01000000.00000004.sdmp, python310.dll.0.dr String found in binary or memory: https://python.org/dev/peps/pep-0263/
Source: PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.dr String found in binary or memory: https://www.openssl.org/H
Source: base_library.zip.0.dr String found in binary or memory: https://www.python.org/
Source: PumpBot.exe, 00000000.00000003.2131474594.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000003.2134741386.0000027396860000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.0.dr String found in binary or memory: https://www.python.org/dev/peps/pep-0205/
Source: PumpBot.exe, 00000003.00000002.2143869403.0000027396000000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.dr String found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FFFA88 0_2_00007FF7A0FFFA88
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1004EA0 0_2_00007FF7A1004EA0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1005DEC 0_2_00007FF7A1005DEC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE58E0 0_2_00007FF7A0FE58E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF2A18 0_2_00007FF7A0FF2A18
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1000A34 0_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A100324C 0_2_00007FF7A100324C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A100511C 0_2_00007FF7A100511C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF0150 0_2_00007FF7A0FF0150
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF21DC 0_2_00007FF7A0FF21DC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FFD1F8 0_2_00007FF7A0FFD1F8
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE7420 0_2_00007FF7A0FE7420
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF8D00 0_2_00007FF7A0FF8D00
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF132C 0_2_00007FF7A0FF132C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF0354 0_2_00007FF7A0FF0354
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1008BE8 0_2_00007FF7A1008BE8
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF16C4 0_2_00007FF7A0FF16C4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF66C4 0_2_00007FF7A0FF66C4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEFD40 0_2_00007FF7A0FEFD40
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FFCD64 0_2_00007FF7A0FFCD64
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF0560 0_2_00007FF7A0FF0560
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1002DB0 0_2_00007FF7A1002DB0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FFFA88 0_2_00007FF7A0FFFA88
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF2614 0_2_00007FF7A0FF2614
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FFD878 0_2_00007FF7A0FFD878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A10058A0 0_2_00007FF7A10058A0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF70FC 0_2_00007FF7A0FF70FC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEFF44 0_2_00007FF7A0FEFF44
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF0764 0_2_00007FF7A0FF0764
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF4FC0 0_2_00007FF7A0FF4FC0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF21DC 3_2_00007FF7A0FF21DC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF132C 3_2_00007FF7A0FF132C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1005DEC 3_2_00007FF7A1005DEC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF2A18 3_2_00007FF7A0FF2A18
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1000A34 3_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A100324C 3_2_00007FF7A100324C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FFFA88 3_2_00007FF7A0FFFA88
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A100511C 3_2_00007FF7A100511C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF0150 3_2_00007FF7A0FF0150
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 3_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FFD1F8 3_2_00007FF7A0FFD1F8
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FE7420 3_2_00007FF7A0FE7420
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF8D00 3_2_00007FF7A0FF8D00
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF0354 3_2_00007FF7A0FF0354
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1008BE8 3_2_00007FF7A1008BE8
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1004EA0 3_2_00007FF7A1004EA0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF16C4 3_2_00007FF7A0FF16C4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF66C4 3_2_00007FF7A0FF66C4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FEFD40 3_2_00007FF7A0FEFD40
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FFCD64 3_2_00007FF7A0FFCD64
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF0560 3_2_00007FF7A0FF0560
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1002DB0 3_2_00007FF7A1002DB0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FFFA88 3_2_00007FF7A0FFFA88
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF2614 3_2_00007FF7A0FF2614
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FFD878 3_2_00007FF7A0FFD878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 3_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A10058A0 3_2_00007FF7A10058A0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FE58E0 3_2_00007FF7A0FE58E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF70FC 3_2_00007FF7A0FF70FC
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FEFF44 3_2_00007FF7A0FEFF44
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF0764 3_2_00007FF7A0FF0764
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF4FC0 3_2_00007FF7A0FF4FC0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3712F80 3_2_00007FFDA3712F80
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA37152E0 3_2_00007FFDA37152E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA371F6E8 3_2_00007FFDA371F6E8
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3711AF0 3_2_00007FFDA3711AF0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3715B38 3_2_00007FFDA3715B38
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3711280 3_2_00007FFDA3711280
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3716E34 3_2_00007FFDA3716E34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3712490 3_2_00007FFDA3712490
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3718CD0 3_2_00007FFDA3718CD0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA4335EE0 3_2_00007FFDA4335EE0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA4333CE0 3_2_00007FFDA4333CE0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA43335B0 3_2_00007FFDA43335B0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA43337D0 3_2_00007FFDA43337D0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA433C638 3_2_00007FFDA433C638
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA433763C 3_2_00007FFDA433763C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA4331000 3_2_00007FFDA4331000
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA5467508 3_2_00007FFDA5467508
Source: C:\Users\user\Desktop\PumpBot.exe Code function: String function: 00007FF7A0FE1CB0 appears 38 times
Source: C:\Users\user\Desktop\PumpBot.exe Code function: String function: 00007FF7A0FE1C50 appears 90 times
Source: unicodedata.pyd.0.dr Static PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: PumpBot.exe, 00000000.00000003.2128335588.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamelibsslH vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_socket.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2126768882.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_ssl.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameunicodedata.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_hashlib.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_bz2.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2125540722.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_decimal.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename_lzma.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameselect.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000000.00000003.2125146329.0000022791A89000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamevcruntime140.dllT vs PumpBot.exe
Source: PumpBot.exe Binary or memory string: OriginalFilename vs PumpBot.exe
Source: PumpBot.exe, 00000003.00000002.2145922625.00007FFD94678000.00000002.00000001.01000000.00000004.sdmp Binary or memory string: OriginalFilenamepython310.dll. vs PumpBot.exe
Source: PumpBot.exe, 00000003.00000002.2146212191.00007FFDA5477000.00000002.00000001.01000000.00000005.sdmp Binary or memory string: OriginalFilenamevcruntime140.dllT vs PumpBot.exe
Source: PumpBot.exe, 00000003.00000002.2146130857.00007FFDA4342000.00000002.00000001.01000000.00000006.sdmp Binary or memory string: OriginalFilename_bz2.pyd. vs PumpBot.exe
Source: PumpBot.exe, 00000003.00000002.2146036278.00007FFDA3734000.00000002.00000001.01000000.00000007.sdmp Binary or memory string: OriginalFilename_lzma.pyd. vs PumpBot.exe
Source: classification engine Classification label: sus27.winEXE@4/14@0/0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE6670 GetLastError,FormatMessageW,WideCharToMultiByte, 0_2_00007FF7A0FE6670
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\Desktop\data Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5252:120:WilError_03
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482 Jump to behavior
Source: PumpBot.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PumpBot.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe File read: C:\Users\user\Desktop\PumpBot.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\PumpBot.exe "C:\Users\user\Desktop\PumpBot.exe"
Source: C:\Users\user\Desktop\PumpBot.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PumpBot.exe Process created: C:\Users\user\Desktop\PumpBot.exe "C:\Users\user\Desktop\PumpBot.exe"
Source: C:\Users\user\Desktop\PumpBot.exe Process created: C:\Users\user\Desktop\PumpBot.exe "C:\Users\user\Desktop\PumpBot.exe" Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: python3.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe File opened: C:\Users\user\Desktop\pyvenv.cfg Jump to behavior
Source: PumpBot.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: PumpBot.exe Static file information: File size 5957263 > 1048576
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PumpBot.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: PumpBot.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: PumpBot.exe, 00000000.00000003.2130927428.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: PumpBot.exe, 00000000.00000003.2131085002.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1t 7 Feb 2023built on: Thu Feb 9 15:27:40 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: libcrypto-1_1.dll.0.dr
Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: PumpBot.exe, 00000000.00000003.2125146329.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2146180642.00007FFDA5471000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: PumpBot.exe, 00000000.00000003.2125741690.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2145981819.00007FFDA372B000.00000002.00000001.01000000.00000007.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: libssl-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: PumpBot.exe, 00000003.00000002.2145582822.00007FFD9456F000.00000002.00000001.01000000.00000004.sdmp, python310.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: PumpBot.exe, 00000000.00000003.2125894783.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2145981819.00007FFDA372B000.00000002.00000001.01000000.00000007.sdmp, _lzma.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: PumpBot.exe, 00000000.00000003.2125324165.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, PumpBot.exe, 00000003.00000002.2146090661.00007FFDA433D000.00000002.00000001.01000000.00000006.sdmp, _bz2.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: PumpBot.exe, 00000000.00000003.2126036451.0000022791A89000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: _ssl.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: libssl-1_1.dll.0.dr
Source: PumpBot.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PumpBot.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PumpBot.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PumpBot.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PumpBot.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: PumpBot.exe Static PE information: section name: _RDATA
Source: VCRUNTIME140.dll.0.dr Static PE information: section name: _RDATA
Source: libcrypto-1_1.dll.0.dr Static PE information: section name: .00cfg
Source: libssl-1_1.dll.0.dr Static PE information: section name: .00cfg
Source: python310.dll.0.dr Static PE information: section name: PyRuntim

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\PumpBot.exe Process created: "C:\Users\user\Desktop\PumpBot.exe"
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\libcrypto-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_decimal.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\libssl-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\VCRUNTIME140.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\python310.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\select.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe File created: C:\Users\user\AppData\Local\Temp\_MEI52482\_socket.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE2F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_00007FF7A0FE2F20
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\libcrypto-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\unicodedata.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_decimal.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_hashlib.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_ssl.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_lzma.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_bz2.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\libssl-1_1.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\python310.dll Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\select.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI52482\_socket.pyd Jump to dropped file
Source: C:\Users\user\Desktop\PumpBot.exe API coverage: 3.8 %
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1000A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 0_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 0_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FE69E0 FindFirstFileExW,FindClose, 0_2_00007FF7A0FE69E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A1000A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose, 3_2_00007FF7A1000A34
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 3_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FE69E0 FindFirstFileExW,FindClose, 3_2_00007FF7A0FE69E0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF6878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError, 3_2_00007FF7A0FF6878
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEAA2C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7A0FEAA2C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1002620 GetProcessHeap, 0_2_00007FF7A1002620
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEAA2C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7A0FEAA2C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEA180 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF7A0FEA180
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FF9C44 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00007FF7A0FF9C44
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEABD4 SetUnhandledExceptionFilter, 0_2_00007FF7A0FEABD4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FEAA2C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00007FF7A0FEAA2C
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FEA180 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_00007FF7A0FEA180
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FF9C44 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00007FF7A0FF9C44
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FF7A0FEABD4 SetUnhandledExceptionFilter, 3_2_00007FF7A0FEABD4
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA37233B0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_00007FFDA37233B0
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA3723980 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00007FFDA3723980
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA4339F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_00007FFDA4339F30
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA433A978 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00007FFDA433A978
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 3_2_00007FFDA547004C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_00007FFDA547004C
Source: C:\Users\user\Desktop\PumpBot.exe Process created: C:\Users\user\Desktop\PumpBot.exe "C:\Users\user\Desktop\PumpBot.exe" Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1008A30 cpuid 0_2_00007FF7A1008A30
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\base_library.zip VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\_bz2.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\PumpBot.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\AppData\Local\Temp\_MEI52482\_lzma.pyd VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Queries volume information: C:\Users\user\Desktop\data\.cache_dir\Ai Powered Bot Starter.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A0FEA910 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00007FF7A0FEA910
Source: C:\Users\user\Desktop\PumpBot.exe Code function: 0_2_00007FF7A1004EA0 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation, 0_2_00007FF7A1004EA0
Source: C:\Users\user\Desktop\PumpBot.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
No contacted IP infos