Click to jump to signature section
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | ReversingLabs: Detection: 44% |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://185.101.104.122/scbronkz.dll |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://185.101.104.122/scbronkz.dllC: |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AB8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4A9D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1433085704.00000286E4A9D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: unknown | Network traffic detected: HTTP traffic on port 49707 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49707 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5968 -s 860 |
Source: classification engine | Classification label: mal100.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5500:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5968 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | ReversingLabs: Detection: 44% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5968 -s 860 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static file information: File size 5839872 > 1048576 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x591400 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Memory written: PID: 5968 base: 7FF9082F0008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Memory written: PID: 5968 base: 7FF90818D9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Memory written: PID: 5968 base: 7FF90830000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Memory written: PID: 5968 base: 7FF9081BCBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1432990489.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHSTRING TOO LONGBAD CAST*CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXEG |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF6580717F7 second address: 7FF658071817 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 btr ax, FFB5h 0x00000009 btc edx, 6Ah 0x0000000d xor cl, FFFFFF83h 0x00000010 inc cx 0x00000012 cmp edi, E980290Ch 0x00000018 xchg byte ptr [esi-2Dh], ah 0x0000001b rol byte ptr [edi+ecx-4Dh], cl 0x0000001f ror byte ptr [edi], 00000031h |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF658071817 second address: 7FF65807181D instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 rol cl, 1 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF658003033 second address: 7FF658003065 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 push edx 0x00000004 xadd di, ax 0x00000008 dec ebp 0x00000009 movzx eax, di 0x0000000c dec esp 0x0000000d mov eax, dword ptr [esp+00000090h] 0x00000014 add di, di 0x00000017 inc ecx 0x00000018 add eax, 513E3ED3h 0x0000001e not ax 0x00000021 movsx edx, sp 0x00000024 inc eax 0x00000025 rcr dh, 00000042h 0x00000028 inc ecx 0x00000029 ror eax, 1 0x0000002b dec eax 0x0000002c btr edx, ecx 0x0000002f inc ecx 0x00000030 bswap eax 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF658003065 second address: 7FF658003096 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 cmp al, FFFFFFA8h 0x00000006 dec eax 0x00000007 movsx esi, bp 0x0000000a inc ecx 0x0000000b add eax, 7E8E46BBh 0x00000011 inc ecx 0x00000012 bswap eax 0x00000014 inc esp 0x00000015 bts eax, esi 0x00000018 inc cx 0x0000001a mov edx, edx 0x0000001c dec eax 0x0000001d arpl ax, bp 0x0000001f inc ecx 0x00000020 sub eax, 037A29CDh 0x00000026 dec ecx 0x00000027 adc esi, ecx 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c add eax, edx 0x0000002e not bp 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF65805C657 second address: 7FF657F5CB39 instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 inc esp 0x00000004 bsf ebp, eax 0x00000007 pop ebx 0x00000008 inc eax 0x00000009 shr bh, cl 0x0000000b inc ecx 0x0000000c pop ebp 0x0000000d dec esp 0x0000000e movsx edx, bp 0x00000011 cmc 0x00000012 inc ecx 0x00000013 rcr cl, 0000005Fh 0x00000016 pop edx 0x00000017 inc ecx 0x00000018 pop esi 0x00000019 dec eax 0x0000001a sal ecx, cl 0x0000001c inc ecx 0x0000001d pop ecx 0x0000001e inc ax 0x00000020 movzx ecx, bh 0x00000023 dec esp 0x00000024 movsx edi, ax 0x00000027 inc sp 0x00000029 bts edi, eax 0x0000002c pop ebp 0x0000002d dec esp 0x0000002e movsx edx, sp 0x00000031 dec ecx 0x00000032 add eax, 00F16886h 0x00000038 inc cx 0x0000003a shl edi, 23h 0x0000003d inc ecx 0x0000003e pop eax 0x0000003f pop edi 0x00000040 inc ecx 0x00000041 pop esp 0x00000042 inc esp 0x00000043 movzx edi, sp 0x00000046 pop ecx 0x00000047 cmp cx, 1DFAh 0x0000004c inc esp 0x0000004d sub dl, ch 0x0000004f popfd 0x00000050 inc ecx 0x00000051 pop edi 0x00000052 inc sp 0x00000054 movsx edx, bl 0x00000057 inc ecx 0x00000058 pop edx 0x00000059 ret 0x0000005a popfd 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF657A9639F second address: 7FF657A963BF instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 btr ax, FFB5h 0x00000009 btc edx, 6Ah 0x0000000d xor cl, FFFFFF83h 0x00000010 inc cx 0x00000012 cmp edi, E980290Ch 0x00000018 xchg byte ptr [esi-2Dh], ah 0x0000001b rol byte ptr [edi+ecx-4Dh], cl 0x0000001f ror byte ptr [edi], 00000031h |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF657A963BF second address: 7FF657A963C5 instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 rol cl, 1 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF657AD27A4 second address: 7FF657AD27D6 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 push edx 0x00000004 xadd di, ax 0x00000008 dec ebp 0x00000009 movzx eax, di 0x0000000c dec esp 0x0000000d mov eax, dword ptr [esp+00000090h] 0x00000014 add di, di 0x00000017 inc ecx 0x00000018 add eax, 513E3ED3h 0x0000001e not ax 0x00000021 movsx edx, sp 0x00000024 inc eax 0x00000025 rcr dh, 00000042h 0x00000028 inc ecx 0x00000029 ror eax, 1 0x0000002b dec eax 0x0000002c btr edx, ecx 0x0000002f inc ecx 0x00000030 bswap eax 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF657AD27D6 second address: 7FF657AD2807 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 cmp al, FFFFFFA8h 0x00000006 dec eax 0x00000007 movsx esi, bp 0x0000000a inc ecx 0x0000000b add eax, 7E8E46BBh 0x00000011 inc ecx 0x00000012 bswap eax 0x00000014 inc esp 0x00000015 bts eax, esi 0x00000018 inc cx 0x0000001a mov edx, edx 0x0000001c dec eax 0x0000001d arpl ax, bp 0x0000001f inc ecx 0x00000020 sub eax, 037A29CDh 0x00000026 dec ecx 0x00000027 adc esi, ecx 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c add eax, edx 0x0000002e not bp 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | RDTSC instruction interceptor: First address: 7FF6579FBAA7 second address: 7FF6579FD388 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 cwde 0x00000005 inc ax 0x00000007 movsx edi, bh 0x0000000a pop edi 0x0000000b inc eax 0x0000000c setp dh 0x0000000f inc ecx 0x00000010 pop eax 0x00000011 inc cx 0x00000013 movsx eax, dh 0x00000016 pop ebx 0x00000017 dec eax 0x00000018 cwde 0x00000019 dec ebp 0x0000001a movsx edi, bx 0x0000001d jmp 00007F1EFCDA36AEh 0x00000022 inc ecx 0x00000023 pop esp 0x00000024 dec eax 0x00000025 movsx ebp, cx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Special instruction interceptor: First address: 7FF657F5CB39 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe | Special instruction interceptor: First address: 7FF657F5CB51 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1432990489.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19 |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe PID: 5968, type: MEMORYSTR |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |