Click to jump to signature section
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | ReversingLabs: Detection: 42% |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49708 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49709 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547951252.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433464121.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/4 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/R |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ll |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433464121.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://rsms.me/This |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49708 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49709 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576 |
Source: classification engine | Classification label: mal96.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4292 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3520:120:WilError_03 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | ReversingLabs: Detection: 42% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static file information: File size 6498304 > 1048576 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x632000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Memory written: PID: 4292 base: 7FFEFE690008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Memory written: PID: 4292 base: 7FFEFE52D9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Memory written: PID: 4292 base: 7FFEFE6A000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Memory written: PID: 4292 base: 7FFEFE55CBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXEZQ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERCORNER2D3DBACKSPACETABENTERPAUSEESCAPESPACEENDHOMEINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIVISUALSMISCCOLORSCONFIGVISUALSVISUALS OTHERSBOX TYPEMISCMISC SETTINGSCOLOR PICKERCONFIGSAVE CONFIGCONFIG.JSONLOAD CONFIGLOBIJETTASTRARIFT_TARGETINGFORM_PC_CKAY/OBREACHBRIMSTONECHAMBERCYPHERKAY/OKILLJOYNEONOMENPHOENIXRAZEREYNASAGESKYESOVAVIPERYORUFADEBOTGEKKOHARBORDEADLOCKVYSEMEDALOVERLAYMEDALOVERLAYCLASS [ %.FM ] HEALTH RENDERED][ CR][V4L0R4NT ESP]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | RDTSC instruction interceptor: First address: 7FF7487B2462 second address: 7FF7487B2476 instructions: 0x00000000 rdtsc 0x00000002 cwd 0x00000004 pop ebx 0x00000005 inc ecx 0x00000006 not bl 0x00000008 inc ecx 0x00000009 pop esp 0x0000000a inc cx 0x0000000c bswap ebx 0x0000000e inc ecx 0x0000000f pop ecx 0x00000010 pop ebp 0x00000011 dec esp 0x00000012 arpl cx, dx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | RDTSC instruction interceptor: First address: 7FF748E206D2 second address: 7FF748E206DD instructions: 0x00000000 rdtsc 0x00000002 popfd 0x00000003 inc esp 0x00000004 movzx ebx, sp 0x00000007 dec eax 0x00000008 cwde 0x00000009 inc ecx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Special instruction interceptor: First address: 7FF748CF9A65 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe | Special instruction interceptor: First address: 7FF748CF9A7D instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWr |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433244877.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |