Edit tour
Windows
Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe
Overview
General Information
Detection
PureLog Stealer, XWorm
Score: | 98 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected BrowserPasswordDump
Yara detected PureLog Stealer
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe (PID: 7476 cmdline:
C:\Users\u ser\Deskto p\Securite Info.com.W in32.Crypt erX-gen.12 642.14495. exe MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 7552 cmdline:
"C:\Window s\System32 \cmd.exe" /c powersh ell set-mp preference -exclusio npath C:\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7604 cmdline:
powershell set-mppre ference -e xclusionpa th C:\ MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - Botmaster 5.8 direct.exe (PID: 8132 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Botmas ter 5.8 di rect.exe" MD5: C9C01FDC7D3AD84CEEB43C6B099A8AD5) - BotMaster.exe (PID: 6256 cmdline:
C:\Program Files (x8 6)\Bot Mas ter\Bot Ma ster\BotMa ster.exe MD5: 895F3A548FD8FA6FD1355AF6D218DA2C) - msedgewebview2.exe (PID: 6072 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --embedd ed-browser -webview=1 --webview -exe-name= BotMaster. exe --webv iew-exe-ve rsion=5.8. 0.1 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- noerrdialo gs --embed ded-browse r-webview- dpi-awaren ess=0 --en able-featu res=MojoIp cz --mojo- named-plat form-chann el-pipe=62 56.5040.80 4299290834 7816484 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 5064 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=c rashpad-ha ndler --us er-data-di r=C:\Users \user\AppD ata\Roamin g\BotMaste r\DefaultP rofiles\EB WebView /p refetch:7 --monitor- self-annot ation=ptyp e=crashpad -handler - -database= C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView\Cras hpad --ann otation=Is OfficialBu ild=1 --an notation=c hannel= -- annotation =chromium- version=11 7.0.5938.1 32 "--anno tation=exe =C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --annota tion=plat= Win64 "--a nnotation= prod=Edge WebView2" --annotati on=ver=117 .0.2045.47 --initial -client-da ta=0x15c,0 x160,0x164 ,0x138,0x1 70,0x7ffdf b488e88,0x 7ffdfb488e 98,0x7ffdf b488ea8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 8128 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=g pu-process --noerrdi alogs --us er-data-di r="C:\User s\user\App Data\Roami ng\BotMast er\Default Profiles\E BWebView" --webview- exe-name=B otMaster.e xe --webvi ew-exe-ver sion=5.8.0 .1 --embed ded-browse r-webview= 1 --embedd ed-browser -webview-d pi-awarene ss=0 --gpu -preferenc es=WAAAAAA AAADgAAAMA AAAAAAAAAA AAAAAAABgA AAAAAA4AAA AAAAAAAAAA AAEAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAG AAAAAAAAAA YAAAAAAAAA AgAAAAAAAA ACAAAAAAAA AAIAAAAAAA AAA== --mo jo-platfor m-channel- handle=173 6 --field- trial-hand le=1752,i, 1815427151 6783547478 ,626465733 8020236319 ,262144 -- enable-fea tures=Mojo Ipcz /pref etch:2 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 3352 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-GB -- service-sa ndbox-type =none --no errdialogs --user-da ta-dir="C: \Users\use r\AppData\ Roaming\Bo tMaster\De faultProfi les\EBWebV iew" --web view-exe-n ame=BotMas ter.exe -- webview-ex e-version= 5.8.0.1 -- embedded-b rowser-web view=1 --e mbedded-br owser-webv iew-dpi-aw areness=0 --mojo-pla tform-chan nel-handle =2196 --fi eld-trial- handle=175 2,i,181542 7151678354 7478,62646 5733802023 6319,26214 4 --enable -features= MojoIpcz / prefetch:3 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 2252 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=u tility --u tility-sub -type=stor age.mojom. StorageSer vice --lan g=en-GB -- service-sa ndbox-type =service - -noerrdial ogs --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \BotMaster \DefaultPr ofiles\EBW ebView" -- webview-ex e-name=Bot Master.exe --webview -exe-versi on=5.8.0.1 --embedde d-browser- webview=1 --embedded -browser-w ebview-dpi -awareness =0 --mojo- platform-c hannel-han dle=2488 - -field-tri al-handle= 1752,i,181 5427151678 3547478,62 6465733802 0236319,26 2144 --ena ble-featur es=MojoIpc z /prefetc h:8 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 4456 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --f irst-rende rer-proces s --lang=e n-GB --dev ice-scale- factor=1 - -num-raste r-threads= 2 --enable -main-fram e-before-a ctivation --renderer -client-id =5 --js-fl ags="--har mony-weak- refs-with- cleanup-so me --expos e-gc --ms- user-local e=en_CH" - -time-tick s-at-unix- epoch=-171 0082776110 454 --laun ch-time-ti cks=638608 1770 --moj o-platform -channel-h andle=3380 --field-t rial-handl e=1752,i,1 8154271516 783547478, 6264657338 020236319, 262144 --e nable-feat ures=MojoI pcz /prefe tch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 7680 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --d isable-gpu -compositi ng --lang= en-GB --de vice-scale -factor=1 --num-rast er-threads =2 --enabl e-main-fra me-before- activation --rendere r-client-i d=6 --js-f lags="--ha rmony-weak -refs-with -cleanup-s ome --expo se-gc --ms -user-loca le=en_CH" --time-tic ks-at-unix -epoch=-17 1008277611 0454 --lau nch-time-t icks=63886 32569 --mo jo-platfor m-channel- handle=392 8 --field- trial-hand le=1752,i, 1815427151 6783547478 ,626465733 8020236319 ,262144 -- enable-fea tures=Mojo Ipcz /pref etch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 7284 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=r enderer -- noerrdialo gs --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ BotMaster\ DefaultPro files\EBWe bView" --w ebview-exe -name=BotM aster.exe --webview- exe-versio n=5.8.0.1 --embedded -browser-w ebview=1 - -embedded- browser-we bview-dpi- awareness= 0 --disabl e-nacl --d isable-gpu -compositi ng --lang= en-GB --de vice-scale -factor=1 --num-rast er-threads =2 --enabl e-main-fra me-before- activation --rendere r-client-i d=7 --js-f lags="--ha rmony-weak -refs-with -cleanup-s ome --expo se-gc --ms -user-loca le=en_CH" --time-tic ks-at-unix -epoch=-17 1008277611 0454 --lau nch-time-t icks=63903 30874 --mo jo-platfor m-channel- handle=428 0 --field- trial-hand le=1752,i, 1815427151 6783547478 ,626465733 8020236319 ,262144 -- enable-fea tures=Mojo Ipcz /pref etch:1 MD5: 9909D978B39FB7369F511D8506C17CA0) - msedgewebview2.exe (PID: 412 cmdline:
"C:\Progra m Files (x 86)\Micros oft\EdgeWe bView\Appl ication\11 7.0.2045.4 7\msedgewe bview2.exe " --type=g pu-process --disable -gpu-sandb ox --use-g l=disabled --gpu-ven dor-id=514 0 --gpu-de vice-id=14 0 --gpu-su b-system-i d=0 --gpu- revision=0 --gpu-dri ver-versio n=10.0.190 41.546 --n oerrdialog s --user-d ata-dir="C :\Users\us er\AppData \Roaming\B otMaster\D efaultProf iles\EBWeb View" --we bview-exe- name=BotMa ster.exe - -webview-e xe-version =5.8.0.1 - -embedded- browser-we bview=1 -- embedded-b rowser-web view-dpi-a wareness=0 --gpu-pre ferences=W AAAAAAAAAD oAAAMAAAAA AAAAAAAAAA AAABgAAAAA AA4AAAAAAA AAAAAAABEA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAGAAAA AAAAAAYAAA AAAAAAAgAA AAAAAAACAA AAAAAAAAIA AAAAAAAAA= = --mojo-p latform-ch annel-hand le=4484 -- field-tria l-handle=1 752,i,1815 4271516783 547478,626 4657338020 236319,262 144 --enab le-feature s=MojoIpcz /prefetch :2 MD5: 9909D978B39FB7369F511D8506C17CA0) - aspnet_compiler.exe (PID: 7180 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\aspn et_compile r.exe MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - schtasks.exe (PID: 3120 cmdline:
C:\Windows \System32\ schtasks.e xe" /creat e /f /RL H IGHEST /sc minute /m o 1 /tn "X Client" /t r "C:\User s\user\App Data\Roami ng\XClient .exe MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 4856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- XClient.exe (PID: 2640 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 4488 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- WinUpdate.exe (PID: 7632 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 7620 cmdline:
"C:\Window s\SysWOW64 \cmd.exe" /k START " " "C:\User s\user\App Data\Local \WinUpdate .exe" & EX IT MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WinUpdate.exe (PID: 7640 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2) - cmd.exe (PID: 4464 cmdline:
"C:\Window s\System32 \cmd.exe" /c powersh ell set-mp preference -exclusio npath C:\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5052 cmdline:
powershell set-mppre ference -e xclusionpa th C:\ MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - Botmaster 5.8 direct.exe (PID: 1720 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Botmas ter 5.8 di rect.exe" MD5: C9C01FDC7D3AD84CEEB43C6B099A8AD5) - aspnet_compiler.exe (PID: 5868 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\aspn et_compile r.exe MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
- XClient.exe (PID: 8020 cmdline:
"C:\Users\ user\AppDa ta\Roaming \XClient.e xe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 7996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 340 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- XClient.exe (PID: 6348 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 2164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- WinUpdate.exe (PID: 1644 cmdline:
"C:\Users\ user\AppDa ta\Local\W inUpdate.e xe" MD5: F24A4D5B6036A3DE2EBA88868BD771F2)
- XClient.exe (PID: 344 cmdline:
"C:\Users\ user\AppDa ta\Roaming \XClient.e xe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 5104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- XClient.exe (PID: 8032 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 2228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- XClient.exe (PID: 6644 cmdline:
C:\Users\u ser\AppDat a\Roaming\ XClient.ex e MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - conhost.exe (PID: 6532 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["title-formula.at.ply.gg"], "Port": "15762", "Aes key": "<123456789>", "Install file": "USB.exe", "Version": "XWorm V5.0"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 23 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_BrowserPasswordDump_1 | Yara detected BrowserPasswordDump | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
Click to see the 9 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp: | 03/10/24-17:32:22.814457 |
SID: | 2852923 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:24.712981 |
SID: | 2852874 |
Source Port: | 15762 |
Destination Port: | 49734 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:30:45.329887 |
SID: | 2853192 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:24.712981 |
SID: | 2852870 |
Source Port: | 15762 |
Destination Port: | 49734 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/10/24-17:32:06.998086 |
SID: | 2855924 |
Source Port: | 49734 |
Destination Port: | 15762 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |