Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515651291.00000173D9730000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: https://curl.haxx.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515589276.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169401415.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/valorant |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515589276.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169401415.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win:443/ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://rsms.me/This |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: d3dcompiler_47.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXEI |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PEID.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: REGMON.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDBG.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FIDDLER.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAQ.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: PEID.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmp | Binary or memory string: IDAG.EXEH |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IDAQ.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FILEMON.EXE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF747B64B94 second address: 7FF747B64BAD instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF747BD644B second address: 7FF747BD6460 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cwde 0x00000004 pop ebp 0x00000005 movsx ebx, sp 0x00000008 inc sp 0x0000000a movsx ebx, ah 0x0000000d cwde 0x0000000e pop ecx 0x0000000f inc sp 0x00000011 cmovbe eax, edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF747BD6460 second address: 7FF747BD6467 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movsx eax, cx 0x00000006 pop esi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF7475EF329 second address: 7FF7475EF342 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF7475BF19D second address: 7FF7475BF1B0 instructions: 0x00000000 rdtsc 0x00000002 pop ecx 0x00000003 cbw 0x00000005 pop edi 0x00000006 cwd 0x00000008 dec esp 0x00000009 movsx esp, dx 0x0000000c inc ecx 0x0000000d movzx eax, dx 0x00000010 pop esi 0x00000011 inc ecx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe | RDTSC instruction interceptor: First address: 7FF7475BF1B0 second address: 7FF7475BF1B4 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 rdtsc |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169227126.00000173D9730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515651291.00000173D9730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: procmon.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: wireshark.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.5.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: procexp.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: LordPE.exe |
Source: Amcache.hve.5.dr | Binary or memory string: MsMpEng.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Tcpview.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: regmon.exe |