Source: | Binary string: wkernel32.pdb source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002D90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741906942.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752429094.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752488546.0000000004FA0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: aNfqvgu.exe, 00000000.00000003.1742374681.0000000002E90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752625832.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: aNfqvgu.exe, 00000000.00000003.1740842200.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1740981282.0000000002E60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751321019.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751619382.0000000005070000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1741427226.0000000002E10000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741243110.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751961082.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752170569.0000000005020000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1740842200.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1740981282.0000000002E60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751321019.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751619382.0000000005070000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: aNfqvgu.exe, 00000000.00000003.1741427226.0000000002E10000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741243110.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751961082.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752170569.0000000005020000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002D90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741906942.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752429094.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752488546.0000000004FA0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1742374681.0000000002E90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752625832.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: unknown | TCP traffic detected without corresponding DNS query: 154.216.20.162 |
Source: Amcache.hve.8.dr | String found in binary or memory: http://upx.sf.net |
Source: svchost.exe, 00000001.00000002.1846321164.00000000026DC000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1846618066.0000000002D0C000.00000004.00000020.00020000.00000000.sdmp, fontdrvhost.exe, fontdrvhost.exe, 00000006.00000002.1991591004.0000016CDEDA0000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://154.216.20.162:1950/ea67a7c847f6620fc89/5mhwlxfi.wrqga |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D0C000.00000004.00000020.00020000.00000000.sdmp, fontdrvhost.exe, 00000006.00000002.1991591004.0000016CDEDA0000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://154.216.20.162:1950/ea67a7c847f6620fc89/5mhwlxfi.wrqgakernelbasentdllkernel32GetProcessMitig |
Source: svchost.exe, 00000001.00000002.1846321164.00000000026DC000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://154.216.20.162:1950/ea67a7c847f6620fc89/5mhwlxfi.wrqgax |
Source: svchost.exe, 00000001.00000003.1808446152.0000000002DA1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cloudflare-dns.com/dns-query |
Source: svchost.exe, 00000001.00000003.1808446152.0000000002DA1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi |
Source: Yara match | File source: 1.3.svchost.exe.50a0000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.aNfqvgu.exe.2e90000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.3.svchost.exe.4e80000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.aNfqvgu.exe.2c70000.7.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000003.1752625832.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1742374681.0000000002E90000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: aNfqvgu.exe PID: 7152, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 5480, type: MEMORYSTR |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_004381D2 | 0_2_004381D2 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0042C231 | 0_2_0042C231 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0042C400 | 0_2_0042C400 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0219C667 | 0_2_0219C667 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_021A8439 | 0_2_021A8439 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0219C498 | 0_2_0219C498 |
Source: C:\Windows\System32\fontdrvhost.exe | Code function: 6_2_0000016CDEDA0C70 | 6_2_0000016CDEDA0C70 |
Source: aNfqvgu.exe | Binary or memory string: OriginalFilename vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741427226.0000000002F3D000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000002.1765588038.0000000002170000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741243110.0000000002D93000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1728126476.00000000021E0000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1739929212.0000000000449000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002D90000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741906942.0000000002C70000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1740842200.0000000002DE8000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741906942.0000000002D02000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1742374681.0000000003071000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKernelbase.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameKernelbase.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1740981282.0000000002FE6000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamentdll.dllj% vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000002.1765381663.0000000000449000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameCFF Explorer.exe: vs aNfqvgu.exe |
Source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002DE0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamekernel32j% vs aNfqvgu.exe |
Source: 00000000.00000002.1765588038.0000000002170000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000003.1747202676.00000000006E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: unknown | Process created: C:\Users\user\Desktop\aNfqvgu.exe "C:\Users\user\Desktop\aNfqvgu.exe" | |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7152 -s 504 | |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\fontdrvhost.exe "C:\Windows\System32\fontdrvhost.exe" | |
Source: C:\Windows\System32\fontdrvhost.exe | Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5244 -s 136 | |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Process created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\System32\svchost.exe" | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process created: C:\Windows\System32\fontdrvhost.exe "C:\Windows\System32\fontdrvhost.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Section loaded: msimg32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Section loaded: msvcr100.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: drprov.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntlanman.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: davclnt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: davhlpr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: | Binary string: wkernel32.pdb source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002D90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741906942.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752429094.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752488546.0000000004FA0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdb source: aNfqvgu.exe, 00000000.00000003.1742374681.0000000002E90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752625832.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: aNfqvgu.exe, 00000000.00000003.1740842200.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1740981282.0000000002E60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751321019.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751619382.0000000005070000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1741427226.0000000002E10000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741243110.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751961082.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752170569.0000000005020000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1740842200.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1740981282.0000000002E60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751321019.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751619382.0000000005070000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wntdll.pdb source: aNfqvgu.exe, 00000000.00000003.1741427226.0000000002E10000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741243110.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1751961082.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752170569.0000000005020000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernel32.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1741985202.0000000002D90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1741906942.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752429094.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752488546.0000000004FA0000.00000004.00000001.00020000.00000000.sdmp |
Source: | Binary string: wkernelbase.pdbUGP source: aNfqvgu.exe, 00000000.00000003.1742374681.0000000002E90000.00000004.00000001.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1742230483.0000000002C70000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752625832.0000000004E80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043BC39 push ecx; ret | 0_3_0043BC59 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043B8EC push edi; ret | 0_3_0043B8F8 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043D2FB push edi; ret | 0_3_0043D2CC |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043A0F9 push FFFFFF82h; iretd | 0_3_0043A0FB |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043FE8F push esi; ret | 0_3_0043FEA1 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_00439F6A push eax; ret | 0_3_00439F75 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043DD01 push esi; ret | 0_3_0043DD6A |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_0043B1DC push eax; ret | 0_3_0043B1DD |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006ED25E push edx; iretd | 0_3_006ED25F |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EC455 push ebx; retf | 0_3_006EC458 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EDAAF push ebx; retf | 0_3_006EDAB3 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EF4A6 push ebx; retf | 0_3_006EF438 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EC0A1 push edx; iretd | 0_3_006EC0A2 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EC4B5 push edi; ret | 0_3_006EC4A7 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EC49C push edi; ret | 0_3_006EC4A7 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EE55A push edx; iretd | 0_3_006EE55B |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EDD2E push ecx; iretd | 0_3_006EDD31 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EE9EF push edx; retf | 0_3_006EEA2F |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EF3D4 push ebx; retf | 0_3_006EF438 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_3_006EB7BB push edi; iretd | 0_3_006EB7D7 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043B8EC push edi; ret | 0_2_0043B8F8 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043A0F9 push FFFFFF82h; iretd | 0_2_0043A0FB |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_00438904 push ecx; ret | 0_2_00438917 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043B1DC push eax; ret | 0_2_0043B1DD |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043D2FB push edi; ret | 0_2_0043D2CC |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043BC39 push ecx; ret | 0_2_0043BC59 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043DD01 push esi; ret | 0_2_0043DD6A |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_0043FE8F push esi; ret | 0_2_0043FEA1 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_00439F6A push eax; ret | 0_2_00439F75 |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Code function: 0_2_021A8B6B push ecx; ret | 0_2_021A8B7E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 1_3_0270225C push eax; ret | 1_3_0270225D |
Source: C:\Users\user\Desktop\aNfqvgu.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: aNfqvgu.exe, 00000000.00000002.1765588038.0000000002170000.00000040.00001000.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1728126476.00000000021E0000.00000004.00001000.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1739929212.0000000000449000.00000040.00000001.01000000.00000003.sdmp, aNfqvgu.exe, 00000000.00000002.1765381663.0000000000449000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ORIGINALFILENAMECFF EXPLORER.EXE: |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXEAUTORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXEILSPY.EXELORDPE.EXEDNSPY.EXEPETOOLS.EXEAUTORUNSC.EX |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: aNfqvgu.exe | Binary or memory string: CFF EXPLORER.EXE |
Source: aNfqvgu.exe, 00000000.00000002.1765588038.0000000002170000.00000040.00001000.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1728126476.00000000021E0000.00000004.00001000.00020000.00000000.sdmp, aNfqvgu.exe, 00000000.00000003.1739929212.0000000000449000.00000040.00000001.01000000.00000003.sdmp, aNfqvgu.exe, 00000000.00000002.1765381663.0000000000449000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: INTERNALNAMECFF EXPLORER.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDUMP.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: svchost.exe, 00000001.00000002.1846618066.0000000002D00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DDLER.EXEIDA.EXEIDA64.EXEIMMUNITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEP |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: VBoxGuest | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\vboxservice.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\vboxtray.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\drivers\VBoxMouse.sys | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: VBoxTrayIPC | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\drivers\VBoxSF.sys | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\vboxhook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosDate | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: \pipe\VBoxTrayIPC | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\drivers\VBoxVideo.sys | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: VBoxMiniRdrDN | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | File opened / queried: C:\Windows\SysWOW64\drivers\VBoxGuest.sys | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion | Jump to behavior |
Source: Amcache.hve.8.dr | Binary or memory string: VMware |
Source: Amcache.hve.8.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.8.dr | Binary or memory string: VMware, Inc. |
Source: svchost.exe, 00000001.00000002.1846591885.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Microsoft-Windows-CoreSystem-InitMachineConfigApplication Mancalrpc:[epmapper,Security=Impersonation Dynamic False]EnumBthLEEnumBthMiniBTHPORTBTHUSBBugCheckcdromcht4iscsicht4vbdDCOMDfsSvcDhcpDhcpv6diskDisplayDnsapiDnscachee1i65x64ebdrveventlogexFATFltMgrfvevolHidBthhidi2chidspiHpSAMDHttpi8042prtiaStorAVCiaStorVibbusIntel-iaLPSS-GPIOIntel-iaLPSS-I2CIntel-iaLPSS2-GPIO2Intel-iaLPSS2-I2CintelppmIPMGMIPMIDRVIPNATHLPIPRouterManagerIPxlatCfgisapnpiScsiPrtItSas35ikbdclasskbdhidkdnicKerberosLfsvclltdioLmHostsLsaSrvLSI_SASLSI_SAS2iLSI_SAS3iLSI_SSSLSMmegasasmegasas2imegasas35imegasrMicrosoft-Antimalware-ShieldProviderMicrosoft-Windows-Audit-CVEMicrosoft-Windows-BitLocker-APIMicrosoft-Windows-BitLocker-DriverMicrosoft-Windows-Bits-ClientMicrosoft-Windows-Bluetooth-BthLEPrepairingMicrosoft-Windows-CoreSystem-InitMachineConfigMicrosoft-Windows-CoreSystem-NetProvision-JoinProviderOnlineMicrosoft-Windows-CorruptedFileRecovery-ClientMicrosoft-Windows-CorruptedFileRecovery-ServerMicrosoft-Windows-Devices-BackgroundMicrosoft-Windows-DfsSvcMicrosoft-Windows-Dhcp-ClientMicrosoft-Windows-DHCPv6-ClientMicrosoft-Windows-Diagnostics-NetworkingMicrosoft-Windows-Directory-Services-SAMMicrosoft-Windows-DiskDiagnosticMicrosoft-Windows-DistributedCOMMicrosoft-Windows-DNS-ClientMicrosoft-Windows-DriverFrameworks-UserModeMicrosoft-Windows-EnhancedStorage-EhStorTcgDrvMicrosoft-Windows-EventCollectorMicrosoft-Windows-EventlogMicrosoft-Windows-exFAT-SQMMicrosoft-Windows-FailoverClustering-ClientMicrosoft-Windows-Fat-SQMMicrosoft-Windows-Fault-Tolerant-HeapMicrosoft-Windows-FilterManagerMicrosoft-Windows-FirewallMicrosoft-Windows-FMSMicrosoft-Windows-FunctionDiscoveryHostMicrosoft-Windows-GPIO-ClassExtensionMicrosoft-Windows-GroupPolicyMicrosoft-Windows-HALMicrosoft-Windows-HttpEventMicrosoft-Windows-HttpServiceMicrosoft-Windows-Hyper-V-HypervisorMicrosoft-Windows-IphlpsvcMicrosoft-Windows-IsolatedUserModeMicrosoft-Windows-Kernel-BootMicrosoft-Windows-Kernel-GeneralMicrosoft-Windows-Kernel-Interrupt-SteeringMicrosoft-Windows-Kernel-IOMicrosoft-Windows-Kernel-PnPMicrosoft-Windows-Kernel-PowerMicrosoft-Windows-Kernel-Processor-PowerMicrosoft-Windows-Kerne |
Source: Amcache.hve.8.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.8.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.8.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.8.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: svchost.exe, 00000001.00000002.1846591885.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1846511935.0000000002C00000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.8.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: svchost.exe, 00000001.00000002.1846532119.0000000002C12000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW( |
Source: svchost.exe, 00000001.00000003.1793652220.0000000002C54000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: System3wareACPIADP80XXAFDAmdK8AmdPPMamdsataamdsbsamdxataApplication Management Group PolicyApplication PopupAppReadinessarcsasAsyncMacatapib06bdrvBasicRenderbeepBthEnumBthLEEnumBthMiniBTHPORTBTHUSBBugCheckcdromcht4iscsicht4vbdDCOMDfsSvcDhcpDhcpv6diskDisplayDnsapiDnscachee1i65x64ebdrveventlogexFATFltMgrfvevolHidBthhidi2chidspiHpSAMDHttpi8042prtiaStorAVCiaStorVibbusIntel-iaLPSS-GPIOIntel-iaLPSS-I2CIntel-iaLPSS2-GPIO2Intel-iaLPSS2-I2CintelppmIPMGMIPMIDRVIPNATHLPIPRouterManagerIPxlatCfgisapnpiScsiPrtItSas35ikbdclasskbdhidkdnicKerberosLfsvclltdioLmHostsLsaSrvLSI_SASLSI_SAS2iLSI_SAS3iLSI_SSSLSMmegasasmegasas2imegasas35imegasrMicrosoft-Antimalware-ShieldProviderMicrosoft-Windows-Audit-CVEMicrosoft-Windows-BitLocker-APIMicrosoft-Windows-BitLocker-DriverMicrosoft-Windows-Bits-ClientMicrosoft-Windows-Bluetooth-BthLEPrepairingMicrosoft-Windows-CoreSystem-InitMachineConfigMicrosoft-Windows-CoreSystem-NetProvision-JoinProviderOnlineMicrosoft-Windows-CorruptedFileRecovery-ClientMicrosoft-Windows-CorruptedFileRecovery-ServerMicrosoft-Windows-Devices-BackgroundMicrosoft-Windows-DfsSvcMicrosoft-Windows-Dhcp-ClientMicrosoft-Windows-DHCPv6-ClientMicrosoft-Windows-Diagnostics-NetworkingMicrosoft-Windows-Directory-Services-SAMMicrosoft-Windows-DiskDiagnosticMicrosoft-Windows-DistributedCOMMicrosoft-Windows-DNS-ClientMicrosoft-Windows-DriverFrameworks-UserModeMicrosoft-Windows-EnhancedStorage-EhStorTcgDrvMicrosoft-Windows-EventCollectorMicrosoft-Windows-EventlogMicrosoft-Windows-exFAT-SQMMicrosoft-Windows-FailoverClustering-ClientMicrosoft-Windows-Fat-SQMMicrosoft-Windows-Fault-Tolerant-HeapMicrosoft-Windows-FilterManagerMicrosoft-Windows-FirewallMicrosoft-Windows-FMSMicrosoft-Windows-FunctionDiscoveryHostMicrosoft-Windows-GPIO-ClassExtensionMicrosoft-Windows-GroupPolicyMicrosoft-Windows-HALMicrosoft-Windows-HttpEventMicrosoft-Windows-HttpServiceMicrosoft-Windows-Hyper-V-HypervisorMicrosoft-Windows-IphlpsvcMicrosoft-Windows-IsolatedUserModeMicrosoft-Windows-Kernel-BootMicrosoft-Windows-Kernel-GeneralMicrosoft-Windows-Kernel-Interrupt-SteeringMicrosoft-Windows-Kernel-IOMicrosoft-Windows-Kernel-PnPMicrosoft-Windows-Kernel-PowerMicrosoft-Windows-Kernel-Processor-PowerMicrosoft-Windows-Kernel-TmMicrosoft-Windows-Kernel-WHEAMicrosoft-Windows-Kernel-XDVMicrosoft-Windows-LanguagePackSetupMicrosor |
Source: Amcache.hve.8.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: svchost.exe, 00000001.00000002.1846591885.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HMicrosoft-Windows-Hyper-V-HypervisorHMicrosoft-Antimalware-ShieldProviderC:\Windows\system32\wbem\fastprox.dlll>Microsoft-Windows-BitLocker-APIdlllHMicrosoft-Windows-Devices-Background@Microsoft-Windows-DiskDiagnostic.dll@Microsoft-Windows-DistributedCOM.dll@Microsoft-Windows-EventCollector.dll>Microsoft-Windows-FilterManagerdlllDMicrosoft-Windows-BitLocker-Driverl |
Source: Amcache.hve.8.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.8.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: svchost.exe, 00000001.00000002.1846591885.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HMicrosoft-Windows-Hyper-V-Hypervisor-WDMicrosoft-Windows-IsolatedUserModeTMicHMicrosoft-Antimalware-ShieldProviderseHMicrosoft-Windows-Devices-Backgroundic@Microsoft-Windows-DistributedCOMows-WindowFApplication Management Group Policyws-WJMicrosoft-Windows-Fault-Tolerant-Heap@Microsoft-Windows-WMPNSS-ServiceMSDTC GatDMicrosoft-Windows-BitLocker-DriversImPlaBMicrosoft-Windows-WLAN-AutoConfigtBTNet>Microsoft-Windows-BitLocker-APImciapercsa@Microsoft-Windows-DiskDiagnosticntFilterPi>Microsoft-Windows-DHCPv6-ClienteAccessRet@Microsoft-Windows-EventCollectorcmbusser>Microsoft-Windows-FilterManagerid2SiSRaidJMicrosoft-Windows-GPIO-ClassExtension<Microsoft-Windows-OfflineFilesonTermServic>Microsoft-Windows-SetupPlatform2usbehci@Microsoft-Windows-Spell-CheckingDisk Provi<Microsoft-Windows-Kernel-PowerSTXRAIDW32Ti@Microsoft-Windows-Kernel-Generalows Disk D<Microsoft-Windows-SpellCheckerWMIxWDMWMP>Microsoft-Windows-StartupRepairvt\Logs\Syst>Microsoft-Windows-TaskSchedulernevt\Logs\Sy<Microsoft-Windows-Time-ServiceSystemevtx >Microsoft-Windows-OverlayFilter250108132856JMicrosoft-Windows-Power-Meter-Polling>Microsoft-Windows-NetworkBridgeFMicrosoft-Windows-LanguagePackSetup>Microsoft-Windows-USB-MAUSBHOSTJMicrosoft-Windows-ResourcePublicationHMicrosoft-Windows-SPB-ClassExtensionJMicrosoft-Windows-WindowsUpdateClientBMicrosoft-Windows-WLAN-AutoConfig |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.8.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.8.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.8.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: svchost.exe, 00000001.00000002.1846591885.0000000002C5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1793652220.0000000002C54000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Microsoft-Windows-Hyper-V-Hypervisor |
Source: Amcache.hve.8.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: svchost.exe, 00000001.00000003.1752787290.00000000050A0000.00000004.00000001.00020000.00000000.sdmp | Binary or memory string: DisableGuestVmNetworkConnectivity |
Source: svchost.exe, 00000001.00000003.1793652220.0000000002C54000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: y-Diagnostic-Task-HandlerMicrosoft-Windows-MemoryDiagnostics-ResultsMicrosoft-Windows-MemoryDiagnostics-ScheduleMicrosoft-Windows-MountMgrMicrosoft-Windows-NDISMicrosoft-Windows-NdisImPlatformSysEvtProviderMicrosoft-Windows-NetworkBridgeMicrosoft-Windows-NtfsMicrosoft-Windows-Ntfs-UBPMMicrosoft-Windows-OfflineFilesMicrosoft-Windows-OverlayFilterMicrosoft-Windows-PersistentMemory-NvdimmMicrosoft-Windows-PersistentMemory-PmemDiskMicrosoft-Windows-Power-Meter-PollingMicrosoft-Windows-Power-TroubleshooterMicrosoft-Windows-ReFSMicrosoft-Windows-ReFS-v1Microsoft-Windows-ResetEngMicrosoft-Windows-Resource-Exhaustion-DetectorMicrosoft-Windows-ResourcePublicationMicrosoft-Windows-SCPNPMicrosoft-Windows-Serial-ClassExtensionMicrosoft-Windows-Serial-ClassExtension-V2Microsoft-Windows-ServicingMicrosoft-Windows-SetupMicrosoft-Windows-SetupPlatformMicrosoft-Windows-SPB-ClassExtensionMicrosoft-Windows-SPB-HIDI2CMicrosoft-Windows-Spell-CheckingMicrosoft-Windows-SpellCheckerMicrosoft-Windows-StartupRepairMicrosoft-Windows-Subsys-SMSSMicrosoft-Windows-TaskSchedulerMicrosoft-Windows-TerminalServices-LocalSessionManagerMicrosoft-Windows-TerminalServices-RemoteConnectionManagerMicrosoft-Windows-Time-ServiceMicrosoft-Windows-TPM-WMIMicrosoft-Windows-USB-CCIDMicrosoft-Windows-USB-MAUSBHOSTMicrosoft-Windows-USB-USBHUB3Microsoft-Windows-USB-USBXHCIMicrosoft-Windows-UserModePowerServiceMicrosoft-Windows-UserPnpMicrosoft-Windows-WHEA-LoggerMicrosoft-Windows-Windows Firewall With Advanced SecurityMicrosoft-Windows-WindowsToGo-StartupOptionsMicrosoft-Windows-WindowsUpdateClientMicrosoft-Windows-WininitMicrosoft-Windows-WinlogonMicrosoft-Windows-WLAN-AutoConfigMicrosoft-Windows-WMPNSS-Servicemlx4_busmouclassmouhidmrxsmbMsBridgeMSDTC GatewayMSDTC WS-AT ProtocolmshidumdfMSiSCSIMTConfigMupmvumisNdisImPlatformNdisImPlatformSysEvtProviderNdisWanndiswanlegacyNetBIOSNetBTNetJoinNetlogonNtfsnvdimmnvstorP2PIMSvcParportpartmgrpcmciapercsas2ipercsas3ipmemPNPMEMPNRPSvcPowerPptpMiniportPrintPrintFilterPipelineSvcProcessorRasAutoRasCfgRasmanRasSstprdbssRemoteAccessRetailDemoRFCOMMrhproxyrspndrSAMsbp2portSCardSvrSchannelscmbussercxsercx2SerialsermouseServerService Control ManagerSiSRaid2SiSRaid4SmartSAMDSMSvcHost 3.0.0.0SMSvcHost 4.0.0.0SNMPTRAPspaceportspbcxSrvstexstorStillImagestorahcistornvmeTcpipTcpip6TCPMonTermServiceTPMtsusbflttsusbhubtunnelUASPStorUmRdpServiceusbaudio2usbehciusbserUser32VDS Basic ProviderVDS Dynamic ProviderVDS Virtual Disk ProviderVirtual Disk S |