Extracted/injected images (may contain unpacked executables)
Download #1
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: schtasks_Zero
Match: Generic_PWS_Memory_Zero
Match: Hijack_Network
Match: Network_HTTP
Match: Network_DNS
Match: DebuggerException__SetConsoleCtrl
Match: vmdetect
Match: anti_dbg
Match: disable_antivirus
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Persistence
Match: KeyLogger
https://download.microsoft.com/download/6/2/3/6230F7A2-D8A9-478B-AC5C-57091B632FCF/officedeploymenttool_x86_5031-1000.exe http://ts-ocsp.ws.symantec.com07 http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 http://ocsp.verisign.com0 https://www.verisign.com/rpa http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt0% https://sectigo.com/CPS0D https://msfree.su/viewforum.php?f=2 http://www.vmware.com/0 http://officecdn.microsoft.com/pr/wsus/setup.exe https://www.verisign.com/rpa0 http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a http://www.microsoft.com/pki/certs/MicrosoftTimeStampPCA.crt0 http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0 http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0 http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s http://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0 http://office.microsoft.com http://www.metalinker.org/ http://www.microsoft.com/pkiops/docs/primarycps.htm0 http://crl.verisign.com/pca3-g5.crl04 http://logo.verisign.com/vslogo.gif04 http://ns.adobe.com/xap/1.0/mm/ http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t https://aria2.github.io/ https://gcc.gnu.org/bugs/): http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0 http://www.microsoft.com/PKI/docs/CPS/default.htm0 https://www.verisign.com/cps0 http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0 http://ocsp.comodoca.com0 https://sectigo.com/CPS0 http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl0v http://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0 http://ocsp.thawte.com0 http://ocsp.usertrust.com0 http://ns.adobe.com/xap/1.0/sType/ResourceRef http://host/file http://ocsp.sectigo.com0 http://ns.adobe.com/xap/1.0/ http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( http://o https://bidouillesecurity.com/disable-windows-defender-in-powershell http://microsoft.com0 http://c http://host/image http://crl.comodoca.com/AAACertificateServices.crl04 http://www.microsoft.com/pki/certs/MicCodSigPCA_08-31-2010.crt0 https://github.com/aria2/aria2/issues http://crl.thawte.com/ThawteTimestampingCA.crl0 http://csc3-2010-aia.verisign.com/CSC3-2010.cer0 http://w https://www.microsoft.com/en-us/download/confirmation.aspx?id=36778 http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: schtasks_Zero
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_SMTP_dotNet
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Persistence
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
http://www.microsoft.com/pki/certs/CSPCA.crt0 http://www.xmlspy.com http://www.microsoft.com/pki/certs/tspca.crt0 http://microsoft.com0
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Hijack_Network
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_SMTP_dotNet
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Persistence
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
http://www.microsoft.com/pki/certs/CSPCA.crt0 http://www.microsoft.com/schemas/ie8tldlistdescription/1.0 http://purl.org/rss/1.0/ http://microsoft.com0 http://www.passport.com http://www.xmlspy.com http://www.microsoft.com/pki/certs/tspca.crt0
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
Extracted/injected images (may contain unpacked executables)
Download #1
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win
Match: Create_Service
Match: Network_TCP_Socket
Match: Network_DGA
Match: Str_Win32_Http_API
Match: ScreenShot
Match: Escalate_priviledges
Match: local_credential_Steal
Match: Generic_PWS_Memory_Zero
Match: Sniff_Audio
Match: Network_HTTP
Match: Network_DNS
Match: Code_injection
Match: DebuggerCheck__GlobalFlags
Match: DebuggerCheck__QueryInfo
Match: DebuggerCheck__RemoteAPI
Match: DebuggerHiding__Thread
Match: DebuggerHiding__Active
Match: DebuggerException__ConsoleCtrl
Match: DebuggerException__SetConsoleCtrl
Match: ThreadControl__Context
Match: SEH__vectored
Match: Check_Dlls
Match: anti_dbg
Match: antisb_threatExpert
Match: disable_dep
Match: win_hook
Match: Network_Downloader
Match: Str_Win32_Internet_API
Match: Network_FTP
Match: KeyLogger
Match: Network_P2P_Win