Source: Yara match | File source: 00000003.00000003.566547321.0012A000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577710609.00442000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.567782220.0012C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424120535.00262000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: images.exe PID: 3596, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 4ifN8B061M.exe PID: 3380, type: MEMORY |
Source: Yara match | File source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000003.566547321.0012A000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577710609.00442000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.567782220.0012C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424120535.00262000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: images.exe PID: 3596, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 4ifN8B061M.exe PID: 3380, type: MEMORY |
Source: Yara match | File source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012F7A20 | 0_2_012F7A20 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012F6AA6 | 0_2_012F6AA6 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012F85EF | 0_2_012F85EF |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E3DFC | 0_2_012E3DFC |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012FD860 | 0_2_012FD860 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012EB840 | 0_2_012EB840 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012EBCE2 | 0_2_012EBCE2 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012EE793 | 0_2_012EE793 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012EFA19 | 0_2_012EFA19 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012EE666 | 0_2_012EE666 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0025F9F3 | 0_2_0025F9F3 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_002492E7 | 0_2_002492E7 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0023F332 | 0_2_0023F332 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0024931C | 0_2_0024931C |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CD6AA6 | 3_2_00CD6AA6 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CD7A20 | 3_2_00CD7A20 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CCBCE2 | 3_2_00CCBCE2 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CCB840 | 3_2_00CCB840 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CDD860 | 3_2_00CDD860 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CD85EF | 3_2_00CD85EF |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC3DFC | 3_2_00CC3DFC |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CCE666 | 3_2_00CCE666 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CCFA19 | 3_2_00CCFA19 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CCE793 | 3_2_00CCE793 |
Source: C:\ProgramData\images.exe | Code function: 3_2_0043F9F3 | 3_2_0043F9F3 |
Source: C:\ProgramData\images.exe | Code function: 3_2_004292E7 | 3_2_004292E7 |
Source: C:\ProgramData\images.exe | Code function: 3_2_0042931C | 3_2_0042931C |
Source: C:\ProgramData\images.exe | Code function: 3_2_0041F332 | 3_2_0041F332 |
Source: 00000003.00000003.565700412.0013A000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000003.00000003.565700412.0013A000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000003.00000002.577725352.00448000.00000002.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000003.00000002.577725352.00448000.00000002.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000000.00000002.424138873.00268000.00000002.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000000.00000002.424138873.00268000.00000002.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000003.00000003.567703677.0013A000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000003.00000003.567703677.0013A000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2_RID2C2E date = 2016-01-30 09:38:11, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2_RID2C2E date = 2016-01-30 09:38:11, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1_RID2C2D date = 2016-01-30 09:38:01, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7 |
Source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E1AA6 push ecx; ret | 0_2_012E1AB9 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_00251130 push eax; ret | 0_2_00251144 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_00251130 push eax; ret | 0_2_0025116C |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0024311B push ebx; iretd | 0_2_0024311C |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_002419C0 push ebp; retf | 0_2_00241A63 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_00230A6F push eax; ret | 0_2_00230A83 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_00230A6F push eax; ret | 0_2_00230AAB |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC1AA6 push ecx; ret | 3_2_00CC1AB9 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00431130 push eax; ret | 3_2_00431144 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00431130 push eax; ret | 3_2_0043116C |
Source: C:\ProgramData\images.exe | Code function: 3_2_0042311B push ebx; iretd | 3_2_0042311C |
Source: C:\ProgramData\images.exe | Code function: 3_2_004219C0 push ebp; retf | 3_2_00421A63 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00410A6F push eax; ret | 3_2_00410A83 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00410A6F push eax; ret | 3_2_00410AAB |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E943A mov eax, dword ptr fs:[00000030h] | 0_2_012E943A |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E528C mov eax, dword ptr fs:[00000030h] | 0_2_012E528C |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0025E8EC mov eax, dword ptr fs:[00000030h] | 0_2_0025E8EC |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0025E5B7 mov eax, dword ptr fs:[00000030h] | 0_2_0025E5B7 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0025E5BE mov eax, dword ptr fs:[00000030h] | 0_2_0025E5BE |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_00230467 mov eax, dword ptr fs:[00000030h] | 0_2_00230467 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_002454A9 mov eax, dword ptr fs:[00000030h] | 0_2_002454A9 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0023E22B mov eax, dword ptr fs:[00000030h] | 0_2_0023E22B |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0023DEF6 mov eax, dword ptr fs:[00000030h] | 0_2_0023DEF6 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_0023DEFD mov eax, dword ptr fs:[00000030h] | 0_2_0023DEFD |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC943A mov eax, dword ptr fs:[00000030h] | 3_2_00CC943A |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC528C mov eax, dword ptr fs:[00000030h] | 3_2_00CC528C |
Source: C:\ProgramData\images.exe | Code function: 3_2_0043E8EC mov eax, dword ptr fs:[00000030h] | 3_2_0043E8EC |
Source: C:\ProgramData\images.exe | Code function: 3_2_0043E5B7 mov eax, dword ptr fs:[00000030h] | 3_2_0043E5B7 |
Source: C:\ProgramData\images.exe | Code function: 3_2_0043E5BE mov eax, dword ptr fs:[00000030h] | 3_2_0043E5BE |
Source: C:\ProgramData\images.exe | Code function: 3_2_00410467 mov eax, dword ptr fs:[00000030h] | 3_2_00410467 |
Source: C:\ProgramData\images.exe | Code function: 3_2_004254A9 mov eax, dword ptr fs:[00000030h] | 3_2_004254A9 |
Source: C:\ProgramData\images.exe | Code function: 3_2_0041E22B mov eax, dword ptr fs:[00000030h] | 3_2_0041E22B |
Source: C:\ProgramData\images.exe | Code function: 3_2_0041DEF6 mov eax, dword ptr fs:[00000030h] | 3_2_0041DEF6 |
Source: C:\ProgramData\images.exe | Code function: 3_2_0041DEFD mov eax, dword ptr fs:[00000030h] | 3_2_0041DEFD |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E19AA SetUnhandledExceptionFilter, | 0_2_012E19AA |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E1817 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_012E1817 |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E1C6F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_012E1C6F |
Source: C:\Users\user\Desktop\4ifN8B061M.exe | Code function: 0_2_012E5F98 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_012E5F98 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC19AA SetUnhandledExceptionFilter, | 3_2_00CC19AA |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC1C6F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_00CC1C6F |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC1817 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00CC1817 |
Source: C:\ProgramData\images.exe | Code function: 3_2_00CC5F98 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00CC5F98 |
Source: Yara match | File source: 00000003.00000003.566547321.0012A000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577710609.00442000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.567782220.0012C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424120535.00262000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: images.exe PID: 3596, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 4ifN8B061M.exe PID: 3380, type: MEMORY |
Source: Yara match | File source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000003.566547321.0012A000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424063177.00230000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577710609.00442000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422033804.003DD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.422009641.003DA000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.567782220.0012C000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.564800575.00130000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.577668662.00410000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.424120535.00262000.00000002.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.421973490.003CD000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: images.exe PID: 3596, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 4ifN8B061M.exe PID: 3380, type: MEMORY |
Source: Yara match | File source: 0.2.4ifN8B061M.exe.250000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.images.exe.430000.1.unpack, type: UNPACKEDPE |