Click to jump to signature section
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | ReversingLabs: Detection: 47% |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515938410.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604914716.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515938410.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604914716.000001C513D94000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://rsms.me/This |
Source: unknown | Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544 |
Source: classification engine | Classification label: mal96.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1836 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5496:120:WilError_03 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | ReversingLabs: Detection: 47% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static file information: File size 6479360 > 1048576 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62d600 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Memory written: PID: 1836 base: 7FFB2D030008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Memory written: PID: 1836 base: 7FFB2CECD9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Memory written: PID: 1836 base: 7FFB2D04000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Memory written: PID: 1836 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515798335.000001C513E04000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513E04000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FIDDLER.EXET&} |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSCONFIGAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERCONFIGSAVE CONFIGCONFIG.JSONLOAD CONFIGCONFIG OPTIONLEGIT CONFIGRAGE CONFIGMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | RDTSC instruction interceptor: First address: 7FF732CFE341 second address: 7FF732C5A00F instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 pop ecx 0x00000005 inc cx 0x00000007 not edx 0x00000009 inc esp 0x0000000a cmovnb edi, esi 0x0000000d pop edx 0x0000000e inc sp 0x00000010 movzx edi, bh 0x00000013 inc eax 0x00000014 not bh 0x00000016 xchg ax, bx 0x00000018 inc ecx 0x00000019 pop esp 0x0000001a dec eax 0x0000001b cwde 0x0000001c cbw 0x0000001e inc ecx 0x0000001f pop eax 0x00000020 pop eax 0x00000021 dec ecx 0x00000022 movzx edi, ax 0x00000025 dec ecx 0x00000026 xchg edx, edi 0x00000028 dec ebp 0x00000029 movsx edi, di 0x0000002c pop ebx 0x0000002d inc eax 0x0000002e mov bh, A3h 0x00000030 inc ecx 0x00000031 pop edx 0x00000032 inc ecx 0x00000033 movzx edi, si 0x00000036 bswap edi 0x00000038 pop edi 0x00000039 inc ecx 0x0000003a pop edi 0x0000003b jmp 00007F8BF0F252A9h 0x00000040 ret 0x00000041 popfd 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | RDTSC instruction interceptor: First address: 7FF73268D38E second address: 7FF7326732BB instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 jmp 00007F8BF07D8E4Ch 0x00000009 pop ebp 0x0000000a cdq 0x0000000b cbw 0x0000000d inc sp 0x0000000f movzx eax, al 0x00000012 pop edi 0x00000013 inc sp 0x00000015 mov esi, ebp 0x00000017 lahf 0x00000018 inc ecx 0x00000019 pop eax 0x0000001a inc bp 0x0000001c cmovne ebp, ebp 0x0000001f dec eax 0x00000020 cwde 0x00000021 pop ebx 0x00000022 inc esp 0x00000023 movzx esi, bp 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | RDTSC instruction interceptor: First address: 7FF7326C5BFC second address: 7FF7326C5C0B instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edx 0x00000004 shl ax, 0064h 0x00000008 inc ecx 0x00000009 sub ebp, 613D3C4Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Special instruction interceptor: First address: 7FF732C5A00F instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe | Special instruction interceptor: First address: 7FF732C5A027 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604981559.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604981559.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWAprMayJunJulAugSepOctNov |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWp} |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |