Click to jump to signature section
Source: file.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: %o1C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb43 source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: file.exe |
Source: | Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.costura.pdb.compressed source: file.exe |
Source: | Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: <Module>BDA0198BB975A26Ecostura.metadatacostura.costura.pdb.compressedcostura.guna.ui2.dll.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.system.runtime.compilerservices.unsafe.dll.compressedcostura.newtonsoft.json.dll.compressedcostura.hotkeylistener.dll.compressedcostura.helper.dll.compressedcostura.system.buffers.dll.compressedcostura.system.numerics.vectors.dll.compressedcostura.system.memory.dll.compressedBASICPANEL.RGB.dllBASICPANEL.tweaksincrease.dllBASICPANEL.moco.ll.dllBASICPANEL.emulatorcrashfix.dllF8A1C01B.D3DDC9A8.resourcesAFF6617D.DE7E9E7D.resourcesBASICPANEL.Properties.Resources.resources# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb$# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: Yara match | File source: 0.2.file.exe.24ad4420000.12.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe/s7x1t5.bin |
Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://files.catbox.moe/s7x1t5.binC: |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win |
Source: file.exe, 00000000.00000002.1534989847.0000024ABC9CC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win( |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/ |
Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/?type=license&key= |
Source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://keyauth.win/api/1.2/?type=license&key=POSTNot |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE69AC6 | 0_2_00007FFB4AE69AC6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE6A872 | 0_2_00007FFB4AE6A872 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE63009 | 0_2_00007FFB4AE63009 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE6D1D9 | 0_2_00007FFB4AE6D1D9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE6BDB5 | 0_2_00007FFB4AE6BDB5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00007FFB4AE6D533 | 0_2_00007FFB4AE6D533 |
Source: file.exe, 00000000.00000002.1574088393.0000024AD4420000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameGuna.UI2.dllD vs file.exe |
Source: file.exe, 00000000.00000002.1543477581.0000024ACC680000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamesvchost.exen' vs file.exe |
Source: file.exe, 00000000.00000002.1533903821.0000024AB9B4C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs file.exe |
Source: file.exe | Binary or memory string: OriginalFilenamesvchost.exen' vs file.exe |
Source: C:\Users\user\Desktop\file.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4540:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5904:120:WilError_03 |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\timeout.exe | Section loaded: version.dll | Jump to behavior |
Source: file.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: %o1C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb43 source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: file.exe |
Source: | Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\Administrator\Desktop\zDesktop\Developer\C++\Chams Z\x64\Release\Chams Z.pdb%% source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.costura.pdb.compressed source: file.exe |
Source: | Binary string: C:\Users\Admin\Desktop\Proj zJhery 2024\Chams Z\x64\Release\Chams Z.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\D0NN3T\Documents\workspace\chams\x64\Release\ImGui Standalone.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC0D1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD4050000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: <Module>BDA0198BB975A26Ecostura.metadatacostura.costura.pdb.compressedcostura.guna.ui2.dll.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.system.runtime.compilerservices.unsafe.dll.compressedcostura.newtonsoft.json.dll.compressedcostura.hotkeylistener.dll.compressedcostura.helper.dll.compressedcostura.system.buffers.dll.compressedcostura.system.numerics.vectors.dll.compressedcostura.system.memory.dll.compressedBASICPANEL.RGB.dllBASICPANEL.tweaksincrease.dllBASICPANEL.moco.ll.dllBASICPANEL.emulatorcrashfix.dllF8A1C01B.D3DDC9A8.resourcesAFF6617D.DE7E9E7D.resourcesBASICPANEL.Properties.Resources.resources# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: E:\External Esp\out\build\x64-Release\ShaderDumper.pdb$# source: file.exe, 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp |
Source: C:\Users\user\Desktop\file.exe | Unpacked PE file: 0.2.file.exe.24ab96a0000.0.unpack Wtv-JwGz:EW;.text:ER;.rsrc:R;.Invalid:EW;EA4A3728:R;.Xerin:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:EW;Unknown_Section4:R;Unknown_Section5:R; |
Source: Yara match | File source: file.exe, type: SAMPLE |
Source: Yara match | File source: 0.2.file.exe.24acc669890.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24acc3d6638.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24ad421e674.9.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24ad4050000.10.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24ad41b1670.11.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.0.file.exe.24ab96a0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24acc221074.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.file.exe.24acc1b4070.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1543477581.0000024ACC3ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1569167006.0000024AD41A5000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1543477581.0000024ACC1A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1483795968.0000024AB96B8000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1543477581.0000024ACC680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: file.exe PID: 5420, type: MEMORYSTR |
Source: file.exe | Static PE information: section name: Wtv-JwGz |
Source: file.exe | Static PE information: section name: .Invalid |
Source: file.exe | Static PE information: section name: EA4A3728 |
Source: file.exe | Static PE information: section name: .Xerin |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: WINE_GET_UNIX_FILE_NAME |
Source: C:\Users\user\Desktop\file.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sys | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sys | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sys | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion | Jump to behavior |
Source: file.exe, 00000000.00000002.1567834392.0000024AD3DAE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll; |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMWARE |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware SVGA II |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools |
Source: file.exe, 00000000.00000002.1534989847.0000024ABB6D1000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL assertion fail, make sure you're not debugging Network. Disable internet firewall on router if possible. & echo: & echo If not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout /t 5 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe "cmd.exe" /c start cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c "color b && title error && echo ssl assertion fail, make sure you're not debugging network. disable internet firewall on router if possible. & echo: & echo if not, ask the developer of the program to use custom domains to fix this. && timeout /t 5" | Jump to behavior |