Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA, |
0_2_0040C820 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree, |
0_2_00407240 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, |
0_2_00409AC0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA, |
0_2_00418EA0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree, |
0_2_00409B60 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B374A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree, |
0_2_00B374A7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B39DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree, |
0_2_00B39DC7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B39D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, |
0_2_00B39D27 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B49107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA, |
0_2_00B49107 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat, |
0_2_00B3CA87 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_0040E430 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_004138B0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, |
0_2_00414570 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00414910 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_0040ED20 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040BE70 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040DE10 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_004016D0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040DA80 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, |
0_2_00413EA0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040F6B0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_00B3DCE7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_00B3C0D7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B3E077 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B31937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B31937 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B3F917 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B44107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose, |
0_2_00B44107 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_00B3E697 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_00B3EF87 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B447D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen, |
0_2_00B447D7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B43B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B43B17 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B44B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B44B77 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2279761545.000000000083E000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/ |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/8 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/CP |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.php |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.php2 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.php3 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.php9 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpR |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpe |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpkP |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpxp |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://62.204.41.177/ows |
Source: Amcache.hve.5.dr |
String found in binary or memory: http://upx.sf.net |
Source: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: msimg32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: msvcr100.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419860 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419860 |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_0040E430 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_004138B0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, |
0_2_00414570 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00414910 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_0040ED20 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040BE70 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040DE10 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_004016D0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040DA80 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, |
0_2_00413EA0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040F6B0 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_00B3DCE7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_00B3C0D7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B3E077 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B31937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B31937 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B3F917 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B44107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose, |
0_2_00B44107 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_00B3E697 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B3EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_00B3EF87 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B447D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen, |
0_2_00B447D7 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B43B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B43B17 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B44B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00B44B77 |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr |
Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware, Inc. |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: VMwareVMwareo} |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr |
Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr |
Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr |
Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20 |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000891000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.5.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr |
Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr |
Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr |
Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr |
Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr |
Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: VMwareVMware |
Source: Amcache.hve.5.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr |
Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr |
Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr |
Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419860 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0041AD48 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0041CEEA SetUnhandledExceptionFilter, |
0_2_0041CEEA |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_0041B33A |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B4B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00B4B5A1 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B4D151 SetUnhandledExceptionFilter, |
0_2_00B4D151 |
Source: C:\Users\user\Desktop\1vYjXDbKHt.exe |
Code function: 0_2_00B4AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00B4AFAF |
Source: Yara match |
File source: 0.3.1vYjXDbKHt.exe.2350000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.1vYjXDbKHt.exe.2350000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.b30e67.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.b30e67.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 1vYjXDbKHt.exe PID: 5000, type: MEMORYSTR |
Source: Yara match |
File source: dump.pcap, type: PCAP |
Source: Yara match |
File source: 0.3.1vYjXDbKHt.exe.2350000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.1vYjXDbKHt.exe.2350000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.b30e67.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.b30e67.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.1vYjXDbKHt.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 1vYjXDbKHt.exe PID: 5000, type: MEMORYSTR |
Source: Yara match |
File source: dump.pcap, type: PCAP |