Click to jump to signature section
Source: exe004.exe | ReversingLabs: Detection: 42% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.9% probability |
Source: exe004.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: memory;costura.memory.dll.compressed;costura.memory.pdb.compressedGsystem.diagnostics.diagnosticsourceucostura.system.diagnostics.diagnosticsource.dll.compressed source: exe004.exe |
Source: | Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: exe004.exe |
Source: | Binary string: costura.costura.pdb.compressed source: exe004.exe |
Source: | Binary string: costura.memory.pdb.compressed source: exe004.exe |
Source: Yara match | File source: 0.2.exe004.exe.27c78ab0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: keyauth.win |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gunaframework.com/api/licensing.php |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gunaui.com/ |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gunaui.com/api/licensing.php |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gunaui.com/pricing |
Source: exe004.exe | Static PE information: section name: ZqM~o)+ |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF80E62 NtQueryInformationProcess, | 0_2_00007FFE7DF80E62 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF8FF49 NtQueryInformationProcess, | 0_2_00007FFE7DF8FF49 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF9009D NtQueryInformationProcess, | 0_2_00007FFE7DF9009D |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF87B1D | 0_2_00007FFE7DF87B1D |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF90522 | 0_2_00007FFE7DF90522 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF905F8 | 0_2_00007FFE7DF905F8 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF90624 | 0_2_00007FFE7DF90624 |
Source: exe004.exe | Static PE information: No import functions for PE file found |
Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameGuna.UI2.dllD vs exe004.exe |
Source: exe004.exe | Binary or memory string: OriginalFilenameVelnest.exe0 vs exe004.exe |
Source: exe004.exe | Static PE information: Section: ZqM~o)+ ZLIB complexity 1.0003260103383458 |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@1/0@1/0 |
Source: C:\Users\user\Desktop\exe004.exe | Mutant created: NULL |
Source: exe004.exe | Static file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.65% |
Source: C:\Users\user\Desktop\exe004.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: exe004.exe | ReversingLabs: Detection: 42% |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 | Jump to behavior |
Source: exe004.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: exe004.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: exe004.exe | Static file information: File size 4638752 > 1048576 |
Source: exe004.exe | Static PE information: Raw size of .text is bigger than: 0x100000 < 0x417c00 |
Source: exe004.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: memory;costura.memory.dll.compressed;costura.memory.pdb.compressedGsystem.diagnostics.diagnosticsourceucostura.system.diagnostics.diagnosticsource.dll.compressed source: exe004.exe |
Source: | Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: exe004.exe |
Source: | Binary string: costura.costura.pdb.compressed source: exe004.exe |
Source: | Binary string: costura.memory.pdb.compressed source: exe004.exe |
Source: C:\Users\user\Desktop\exe004.exe | Unpacked PE file: 0.2.exe004.exe.27c5dbd0000.0.unpack ZqM~o)+:EW;.text:ER;.rsrc:R;.Invalid:EW;Wrong:R;.Xerin:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:EW;Unknown_Section4:R;Unknown_Section5:R; |
Source: Yara match | File source: exe004.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.exe004.exe.27c786e0000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.exe004.exe.27c786e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.exe004.exe.27c5dbd0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2599210496.0000027C786E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1348039579.0000027C5DC3E000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: exe004.exe PID: 7844, type: MEMORYSTR |
Source: exe004.exe | Static PE information: 0xE6FDCBF7 [Tue Oct 21 01:55:03 2092 UTC] |
Source: exe004.exe | Static PE information: section name: ZqM~o)+ |
Source: exe004.exe | Static PE information: section name: .Invalid |
Source: exe004.exe | Static PE information: section name: Wrong |
Source: exe004.exe | Static PE information: section name: .Xerin |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_0000027C5DBD6119 push 370E200Ch; retf | 0_2_0000027C5DBD6131 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF800BD pushad ; iretd | 0_2_00007FFE7DF800C1 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF8A54A push eax; retf | 0_2_00007FFE7DF8A54B |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF92DB5 push edi; iretd | 0_2_00007FFE7DF92DB6 |
Source: C:\Users\user\Desktop\exe004.exe | Code function: 0_2_00007FFE7DF939F6 push ss; ret | 0_2_00007FFE7DF939F7 |
Source: exe004.exe | Static PE information: section name: ZqM~o)+ entropy: 7.9994516540380705 |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController |
Source: C:\Users\user\Desktop\exe004.exe | Section loaded: OutputDebugStringW count: 1929 |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: WINE_GET_UNIX_FILE_NAME |
Source: C:\Users\user\Desktop\exe004.exe | Memory allocated: 27C5FB30000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Memory allocated: 27C77D50000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | File opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sys | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0 | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | File opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sys | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | File opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sys | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Window / User API: threadDelayed 1800 | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Window / User API: threadDelayed 6875 | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe TID: 7956 | Thread sleep time: -1800000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe TID: 7956 | Thread sleep time: -6875000s >= -30000s | Jump to behavior |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMWARE |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys8 |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware SVGA II |
Source: exe004.exe, 00000000.00000002.2598784936.0000027C78534000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools |
Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys |
Source: C:\Users\user\Desktop\exe004.exe | Queries volume information: C:\Users\user\Desktop\exe004.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\exe004.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |