Click to jump to signature section
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | ReversingLabs: Detection: 34% |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49717 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49718 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen |
Source: Amcache.hve.7.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226412923.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2178399949.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/$ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/;dlm/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/C |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/o |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://rsms.me/This |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49718 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49717 |
Source: unknown | Network traffic detected: HTTP traffic on port 49717 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49718 -> 443 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49717 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49718 version: TLS 1.2 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: .vmp0 and .vmp1 section names |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564 |
Source: classification engine | Classification label: mal96.evad.winEXE@3/6@1/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4208:120:WilError_03 |
Source: C:\Windows\System32\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3048 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | ReversingLabs: Detection: 34% |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static file information: File size 6471168 > 1048576 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62b600 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: section name: .vmp0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Static PE information: section name: .vmp1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Memory written: PID: 3048 base: 7FFDB4590008 value: E9 EB D9 E9 FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Memory written: PID: 3048 base: 7FFDB442D9F0 value: E9 20 26 16 00 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Memory written: PID: 3048 base: 7FFDB45A000D value: E9 BB CB EB FF | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Memory written: PID: 3048 base: 7FFDB445CBC0 value: E9 5A 34 14 00 | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226412923.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE$ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6AD444B94 second address: 7FF6AD444BAD instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6AD4B644B second address: 7FF6AD4B6460 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cwde 0x00000004 pop ebp 0x00000005 movsx ebx, sp 0x00000008 inc sp 0x0000000a movsx ebx, ah 0x0000000d cwde 0x0000000e pop ecx 0x0000000f inc sp 0x00000011 cmovbe eax, edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6AD4B6460 second address: 7FF6AD4B6467 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movsx eax, cx 0x00000006 pop esi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6ACECF329 second address: 7FF6ACECF342 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6ACE9F19D second address: 7FF6ACE9F1B0 instructions: 0x00000000 rdtsc 0x00000002 pop ecx 0x00000003 cbw 0x00000005 pop edi 0x00000006 cwd 0x00000008 dec esp 0x00000009 movsx esp, dx 0x0000000c inc ecx 0x0000000d movzx eax, dx 0x00000010 pop esi 0x00000011 inc ecx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF6ACE9F1B0 second address: 7FF6ACE9F1B4 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Special instruction interceptor: First address: 7FF6AD3B3A90 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Special instruction interceptor: First address: 7FF6AD3B3AA8 instructions rdtsc caused by: RDTSC with Trap Flag (TF) |
Source: Amcache.hve.7.dr | Binary or memory string: VMware |
Source: Amcache.hve.7.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.7.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.7.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.7.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.7.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.7.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.7.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.7.dr | Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.7.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.7.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.7.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.7.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.7.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.7.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.7.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.7.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.7.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.7.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.7.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.7.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.7.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.7.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.7.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.7.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.7.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.7.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.7.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.7.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.7.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.7.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.7.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.7.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.7.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: regmon.exe |