Click to jump to signature section
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | ReversingLabs: Detection: 50% |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49728 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49734 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: h.pdB source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287495221.00007FF75CB78000.00000020.00000001.01000000.00000003.sdmp |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://185.101.104.122/scbronkz09.dll |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: http://185.101.104.122/scbronkz09.dllC: |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286953051.0000024127062000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412707F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241143427.0000024127062000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/7-vY |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/L=jX |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286953051.0000024127062000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241143427.0000024127062000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ptember |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/berNovemberDecemberAMPMMM/dd/yydddd |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/y |
Source: unknown | Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49728 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49728 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49728 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49734 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5336 -s 708 |
Source: classification engine | Classification label: mal100.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3204:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5336 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | ReversingLabs: Detection: 50% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5336 -s 708 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static file information: File size 5829632 > 1048576 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x58ec00 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: h.pdB source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287495221.00007FF75CB78000.00000020.00000001.01000000.00000003.sdmp |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Memory written: PID: 5336 base: 7FFDB4590008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Memory written: PID: 5336 base: 7FFDB442D9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Memory written: PID: 5336 base: 7FFDB45A000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Memory written: PID: 5336 base: 7FFDB445CBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHSTRING TOO LONGBAD CAST*CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXEDLLK=MX |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.00000241270B5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXEZ |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | RDTSC instruction interceptor: First address: 7FF75D43CFED second address: 7FF75D43D011 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebx 0x00000004 cdq 0x00000005 inc ecx 0x00000006 pop ecx 0x00000007 inc cx 0x00000009 movzx esi, dl 0x0000000c lahf 0x0000000d inc ecx 0x0000000e pop esi 0x0000000f cwd 0x00000011 dec esp 0x00000012 movzx edx, bp 0x00000015 inc cx 0x00000017 bswap eax 0x00000019 pop ebx 0x0000001a pop esi 0x0000001b dec eax 0x0000001c cwde 0x0000001d lahf 0x0000001e inc sp 0x00000020 movzx eax, bl 0x00000023 pop edi 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | RDTSC instruction interceptor: First address: 7FF75CD9C4BF second address: 7FF75CD82B8D instructions: 0x00000000 rdtsc 0x00000002 shr cl, cl 0x00000004 stc 0x00000005 or ch, FFFFFF8Bh 0x00000008 dec eax 0x00000009 sub edi, 00000008h 0x0000000f dec esp 0x00000010 btc ecx, ebx 0x00000013 mov dword ptr [edi], edx 0x00000015 inc ebp 0x00000016 test bl, ch 0x00000018 mov dword ptr [edi+04h], eax 0x0000001b rcr ch, FFFFFFB6h 0x0000001e inc ecx 0x0000001f mov cl, dh 0x00000021 dec ecx 0x00000022 sub ebx, 00000004h 0x00000028 btc ecx, 6Dh 0x0000002c dec eax 0x0000002d arpl bx, cx 0x0000002f dec eax 0x00000030 test ecx, 72FC55E8h 0x00000036 inc ecx 0x00000037 mov ecx, dword ptr [ebx] 0x00000039 stc 0x0000003a inc ecx 0x0000003b xor ecx, edx 0x0000003d jmp 00007F67FC742EF5h 0x00000042 not ecx 0x00000044 jmp 00007F67FC7731C7h 0x00000049 dec ecx 0x0000004b inc esp 0x0000004c test dl, bl 0x0000004e neg ecx 0x00000050 test bh, FFFFFFBEh 0x00000053 xor ecx, 24EA638Bh 0x00000059 inc ecx 0x0000005a push edx 0x0000005b inc ecx 0x0000005c ror dl, FFFFFFDAh 0x0000005f inc ecx 0x00000060 sub edx, 2A2F4E5Ch 0x00000066 dec ecx 0x00000067 rcl edx, FFFFFFE5h 0x0000006a xor dword ptr [esp], ecx 0x0000006d inc ecx 0x0000006e rcl dl, 00000054h 0x00000071 jmp 00007F67FC7DFD9Eh 0x00000076 inc ecx 0x00000077 pop edx 0x00000078 dec eax 0x00000079 arpl cx, cx 0x0000007b cmp dl, FFFFFFBAh 0x0000007e dec esp 0x0000007f add ecx, ecx 0x00000081 jmp 00007F67FC6E2D11h 0x00000086 jmp 00007F67FC79E906h 0x0000008b dec eax 0x0000008c lea ebp, dword ptr [esp+00000140h] 0x00000093 inc eax 0x00000094 test ch, al 0x00000096 stc 0x00000097 dec eax 0x00000098 cmp edi, ebp 0x0000009a jmp 00007F67FC7F8733h 0x0000009f ja 00007F67FC7CCFF4h 0x000000a5 inc ecx 0x000000a6 push ecx 0x000000a7 ret 0x000000a8 inc esp 0x000000a9 mov eax, dword ptr [edi] 0x000000ab rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | RDTSC instruction interceptor: First address: 7FF75CDE8F2E second address: 7FF75CDE8F52 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebx 0x00000004 cdq 0x00000005 inc ecx 0x00000006 pop ecx 0x00000007 inc cx 0x00000009 movzx esi, dl 0x0000000c lahf 0x0000000d inc ecx 0x0000000e pop esi 0x0000000f cwd 0x00000011 dec esp 0x00000012 movzx edx, bp 0x00000015 inc cx 0x00000017 bswap eax 0x00000019 pop ebx 0x0000001a pop esi 0x0000001b dec eax 0x0000001c cwde 0x0000001d lahf 0x0000001e inc sp 0x00000020 movzx eax, bl 0x00000023 pop edi 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Special instruction interceptor: First address: 7FF75D2FA9C3 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe | Special instruction interceptor: First address: 7FF75D2FA9DB instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWm |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@ |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe PID: 5336, type: MEMORYSTR |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287106707.00000241270B5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.00000241270B5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |