Click to jump to signature section
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | ReversingLabs: Detection: 50% |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758466590.00007FF76F45F000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365737863.000001E9E60AE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758466590.00007FF76F45F000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E601C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365576604.000001E9E6070000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757941989.000001E9E6070000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/Y |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758466590.00007FF76F45F000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E601C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E601C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/dll |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757941989.000001E9E6064000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365576604.000001E9E6064000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758466590.00007FF76F45F000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://rsms.me/This |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4872 -s 1532 |
Source: classification engine | Classification label: mal96.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4472:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4872 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | ReversingLabs: Detection: 50% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4872 -s 1532 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static file information: File size 6502912 > 1048576 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x633200 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Memory written: PID: 4872 base: 7FFB2D030008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Memory written: PID: 4872 base: 7FFB2CECD9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Memory written: PID: 4872 base: 7FFB2D04000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Memory written: PID: 4872 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758197984.000001E9E60C8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E601C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757941989.000001E9E6064000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365576604.000001E9E6064000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXEME=CH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758337904.00007FF76F2E1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG%F: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYCORNER2D3DLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTVISUALSMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTVISUALSVISUALS OTHERSBOX TYPEMISCMISC SETTINGSCOLOR PICKERLOBIJETTASTRARIFT_TARGETINGFORM_PC_CKAY/OBREACHBRIMSTONECHAMBERCYPHERKAY/OKILLJOYNEONOMENPHOENIXRAZEREYNASAGESKYESOVAVIPERYORUFADEBOTGEKKOHARBORDEADLOCKVYSEMEDALOVERLAYMEDALOVERLAYCLASS [ %.FM ] HEALTH RENDERED][ CR][V4L0R4NT PLUS]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758337904.00007FF76F2E1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758337904.00007FF76F2E1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758197984.000001E9E60C8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365685034.000001E9E60C8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | RDTSC instruction interceptor: First address: 7FF76F805BD8 second address: 7FF76F805BDF instructions: 0x00000000 rdtsc 0x00000002 cbw 0x00000004 dec eax 0x00000005 cwde 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | RDTSC instruction interceptor: First address: 7FF76F7BA150 second address: 7FF76F7BA161 instructions: 0x00000000 rdtsc 0x00000002 bswap ebx 0x00000004 inc ecx 0x00000005 pop eax 0x00000006 dec eax 0x00000007 movzx ebp, si 0x0000000a inc ecx 0x0000000b pop ecx 0x0000000c inc sp 0x0000000e cmovbe ebp, ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Special instruction interceptor: First address: 7FF76FD1B932 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe | Special instruction interceptor: First address: 7FF76FD1B94A instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758048709.000001E9E60AE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365462165.000001E9E60AE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000003.1365737863.000001E9E60AE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW 0 |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758197984.000001E9E60C8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1757820163.000001E9E603F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exe, 00000000.00000002.1758430539.00007FF76F413000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |