Source: |
Binary string: NEWdefault_setup.pdb source: file.exe |
Source: |
Binary string: PE.pdbH] source: file.exe, 00000000.00000002.2042725412.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2057498658.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp |
Source: |
Binary string: PE.pdb source: file.exe, 00000000.00000002.2042725412.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2057498658.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp |
Source: |
Binary string: C:\Users\teres\AppData\Local\Temp\Report.A66214F7-6635-4084-8609-050NK772Dll\obj\Debug\uOxoA.pdb source: file.exe, 00000000.00000002.2047818630.00000000037AF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2058833933.0000000004E90000.00000004.08000000.00040000.00000000.sdmp |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.1.237.91 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.18.38.233 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 104.18.38.233 |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003313000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: $]q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\]q equals www.youtube.com (Youtube) |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003313000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003313000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\]q equals www.youtube.com (Youtube) |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003313000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`,]q equals www.youtube.com (Youtube) |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003313000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: `,]q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube) |
Source: file.exe, 00000000.00000002.2047818630.00000000036B4000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://ConstBaseUri/ConstService.svc/ |
Source: file.exe |
String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: file.exe |
String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: file.exe |
String found in binary or memory: http://ocsp.sectigo.com0 |
Source: file.exe |
String found in binary or memory: http://www.georss.org/georss |
Source: file.exe |
String found in binary or memory: http://www.iana.org/assignments/relation/ |
Source: file.exe |
String found in binary or memory: http://www.opengis.net/gml |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003231000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.s |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003231000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ip |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://discord.com/api/v9/users/ |
Source: file.exe |
String found in binary or memory: https://sectigo.com/CPS0 |
Source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D55CD0 |
0_2_00D55CD0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D560B8 |
0_2_00D560B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D560A8 |
0_2_00D560A8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00D55CC1 |
0_2_00D55CC1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_05011A40 |
0_2_05011A40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_05011A3F |
0_2_05011A3F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_03107750 |
2_2_03107750 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_03107740 |
2_2_03107740 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_03107498 |
2_2_03107498 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_0310748B |
2_2_0310748B |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_0581274C |
2_2_0581274C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_05813611 |
2_2_05813611 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_05811613 |
2_2_05811613 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_05811667 |
2_2_05811667 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_05811668 |
2_2_05811668 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Code function: 2_2_05810CA8 |
2_2_05810CA8 |
Source: file.exe, 00000000.00000000.2035000777.0000000000022000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameNEWdefault_setup.exe$ vs file.exe |
Source: file.exe, 00000000.00000002.2047818630.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameMummifies.exe" vs file.exe |
Source: file.exe, 00000000.00000002.2047818630.00000000037AF000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameuOxoA.dll0 vs file.exe |
Source: file.exe, 00000000.00000002.2058833933.0000000004E90000.00000004.08000000.00040000.00000000.sdmp |
Binary or memory string: OriginalFilenameuOxoA.dll0 vs file.exe |
Source: file.exe, 00000000.00000002.2047818630.0000000003D22000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameMummifies.exe" vs file.exe |
Source: file.exe, 00000000.00000002.2042725412.00000000026B1000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamePE.dll& vs file.exe |
Source: file.exe, 00000000.00000002.2042725412.00000000027B3000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclrjit.dllT vs file.exe |
Source: file.exe, 00000000.00000002.2042725412.00000000027B3000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilename vs file.exe |
Source: file.exe, 00000000.00000002.2042725412.00000000027B3000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: $]q,\\StringFileInfo\\040904B0\\OriginalFilename vs file.exe |
Source: file.exe, 00000000.00000002.2057498658.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp |
Binary or memory string: OriginalFilenamePE.dll& vs file.exe |
Source: file.exe, 00000000.00000002.2047818630.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameMummifies.exe" vs file.exe |
Source: file.exe, 00000000.00000002.2041785195.0000000000A0E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs file.exe |
Source: file.exe, 00000000.00000002.2047818630.0000000003D8A000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameMummifies.exe" vs file.exe |
Source: file.exe |
Binary or memory string: OriginalFilenameNEWdefault_setup.exe$ vs file.exe |
Source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.file.exe.4e90000.9.raw.unpack, BxuDLR.cs |
Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, PBE.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, Strings.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, A2H1lUZ15GsIooGy4G.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, A2H1lUZ15GsIooGy4G.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Section loaded: mscorjit.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: |
Binary string: NEWdefault_setup.pdb source: file.exe |
Source: |
Binary string: PE.pdbH] source: file.exe, 00000000.00000002.2042725412.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2057498658.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp |
Source: |
Binary string: PE.pdb source: file.exe, 00000000.00000002.2042725412.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2057498658.0000000004BC0000.00000004.08000000.00040000.00000000.sdmp |
Source: |
Binary string: C:\Users\teres\AppData\Local\Temp\Report.A66214F7-6635-4084-8609-050NK772Dll\obj\Debug\uOxoA.pdb source: file.exe, 00000000.00000002.2047818630.00000000037AF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2058833933.0000000004E90000.00000004.08000000.00040000.00000000.sdmp |
Source: 0.2.file.exe.3beea60.3.raw.unpack, StringDecrypt.cs |
High entropy of concatenated method names: 'Xor', 'FromBase64', 'BytesToStringConverted', 'Read', 'EKO0Z7Pxk5gWC6CJcr0', 'qBdTaqPivXhTI3xrOcO', 'uR1x7APWCHDi3duJ9Tx', 'pFlcW5PuNVuqUGO2UJt', 'xIkIb8PhUB9WSy6mhot' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, Form1.cs |
High entropy of concatenated method names: '_003CReadLine_003Eb__2_0', 'nKlPPFrBuOyguttl2JG', 'lQoKE4rMglU8oT2E9Cr', 'Px2onyrZlJxFTURnuB1', 'Form1_Load', 'ReadLine', 'Dispose', 'InitializeComponent', 'zvQxIsEK9FcxKGjfoCU', 'TlXsgrEvaMfHZ8XbFxi' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, Strings.cs |
High entropy of concatenated method names: 'Init', 'Decrypt', 'Get', 'r7RSSvUpLinc0hcMarE', 'VaXVGCUMned0u2TkY9I', 'JquY6lUZ8rJsN2Ot347', 'Mg7ENNUKwMyuxX13CQ1', 'cjRk6dUvCgs6IygYJn7', 'ab1THGUlEVjfj4bowFo' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, IPv4Helper.cs |
High entropy of concatenated method names: 'IsLocalIp', 'GetDefaultIPv4Address', 'Request', 'tXwG1jU8BDU8MUgF25s', 'KXofDZUmQ7Z9O90iFjE', 'OFCIsDUk20WFhUxbhl0', 'YYSPA3UHCwGFouB6HEE', 'mc7ylqUshLxRD9mHyEh', 'u8wBw8Uej1O94X1bxYT' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, Auhi.cs |
High entropy of concatenated method names: 'I\u04341', 'I\u04342', 'I\u04343', 'I\u04344', 'WIqEIfnUEBeHJB2kQ8N', 'LjqOtonGdhfi1cAvGO7', 'q1wuYNnfWTDZIXAalCj', 'uCpsyAnrWpUFgkZ3xNX', 'og9qXQnOosJ1t9ECtwu', 'PcvdUanw7AhqJhcyo0k' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, FieldRootRoot.cs |
High entropy of concatenated method names: 'Field1', 'Rerwkjnk2k92Dke6bTh', 'UivWd5nHPyQoGipavk4', 'r1cLQ8nsd2pXcoDjMtw', 'C2VTVmneLXAk5oR8sKL', 'O7riNHnBhAwWNmVsPir', 'dB5qu9n8yJhgxMxpWpo', 'HpvuoinmqHATWBT0YIJ' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, FieldRoot19.cs |
High entropy of concatenated method names: 'Field1', 'Field2', 'Field3', 'mfsisq754Lbo2iZZOfT', 'W5Lm4W7zDsCRXmZPweY', 'vdOuk6n4ZAgsmnjOsNM', 'sToChBnX867tvhKnFfy', 'MKWOVw7b5w6PKeMON9f', 'cxmU4m7J0jKN3dH5GIt' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, TripleDes.cs |
High entropy of concatenated method names: 'ComputeVoid', 'Compute', 'DecryptStringDesCbc', 'DecryptByteDesCbc', 'bgOklRPoJM4PVpCOJPS', 'Aqbei7Pbaem13Nme1Pr', 'sYQBXNPJnVCylvDEZCM', 'CAGZ8SP5U9LHRSOZAWr', 'SoXfIHPzfNbCG33KH0H', 'vBbaUyU4jH7To54Nw2I' |
Source: 0.2.file.exe.3beea60.3.raw.unpack, A2H1lUZ15GsIooGy4G.cs |
High entropy of concatenated method names: 'DywKPUObIYCXCwNx7Gb', 'xs9vAXOJnaMeDGpwPIB', 'LtQPyoxJn7', 'Mywb1mwXpGGFtTeXGfD', 'jVh2E3wLZXU8S9kxkgh', 'wDA3gjwjSrCoI6wpEjs', 'g38PJ8K3c0', 'AZCPHbxqQi', 'kjCPpoa2Hi', 'zssPO0JXVk' |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \QEMU-GA.EXE@\]Q |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \QEMU-GA.EXE`,]Q |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \QEMU-GA.EXE |
Source: C:\Users\user\Desktop\file.exe |
Memory allocated: 9E0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Memory allocated: 26B0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Memory allocated: 46B0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Memory allocated: 30A0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Memory allocated: 3230000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Memory allocated: 5230000 memory reserve | memory write watch |
Jump to behavior |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \qemu-ga.exe`,]q |
Source: file.exe |
Binary or memory string: YDKWYRQAKCYLLBPMZEKWHAEKDPRLFSWRDJHEYALGLZKWYEIAHFEMTD |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \qemu-ga.exe |
Source: MSBuild.exe, 00000002.00000002.2055185059.0000000003363000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \qemu-ga.exe@\]q |
Source: file.exe |
Binary or memory string: gqvJFvQEmUBCxZCkaXZy |
Source: file.exe |
Binary or memory string: Qemu5sffh1WhJCD4BaL |
Source: C:\Users\user\Desktop\file.exe |
Queries volume information: C:\Users\user\Desktop\file.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\file.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: file.exe, type: SAMPLE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.0.file.exe.20000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003D22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.2047476095.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003D8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000000.2035000777.0000000000022000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.00000000037AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: file.exe, type: SAMPLE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.0.file.exe.20000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003D22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000002.00000002.2047476095.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003D8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000000.2035000777.0000000000022000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2047818630.00000000037AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3cbeeb0.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3b86830.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3d270e0.4.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3beea60.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.3a3f010.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.file.exe.38f77e0.7.raw.unpack, type: UNPACKEDPE |