Click to jump to signature section
Source: 64Tgzu2FKh.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: 64Tgzu2FKh.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdbLm source: 64Tgzu2FKh.exe, 00000000.00000003.853287489.000000000299D000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.0.dr |
Source: | Binary string: mshtml.pdb source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdb source: 64Tgzu2FKh.exe, 00000000.00000003.853287489.000000000299D000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.0.dr |
Source: | Binary string: mshtml.pdbUGP source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_0040595A GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_0040595A |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_0040658F FindFirstFileW,FindClose, | 0_2_0040658F |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_00402862 FindFirstFileW, | 0_2_00402862 |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local\Adobe | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local\Adobe\Acrobat | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | File opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA | Jump to behavior |
Source: Joe Sandbox View | IP Address: 203.175.174.69 203.175.174.69 |
Source: global traffic | HTTP traffic detected: GET /rh/rheu.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Host: bluemaxxlaser.com |
Source: global traffic | TCP traffic: 192.168.11.20:49850 -> 45.66.230.155:2537 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.66.230.155 |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047710499.0000000005797000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/ |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2115468679.0000000005794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.bin |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2114909158.0000000005748000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.bin00W# |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2114909158.0000000005748000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.bin2 |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047710499.0000000005797000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000002.2115468679.0000000005794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.binBfk |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2127439633.0000000034F70000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.binGoucsFllalramsyadvocates.co |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047710499.0000000005797000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000002.2115468679.0000000005794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.binIf |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2114909158.0000000005748000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.binX |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047710499.0000000005797000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000002.2115468679.0000000005794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.bincf |
Source: 64Tgzu2FKh.exe, 0000000B.00000002.2114909158.0000000005748000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://bluemaxxlaser.com/rh/rheu.binz |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference. |
Source: 64Tgzu2FKh.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: http://www.gopher.ftp://ftp. |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000626000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD |
Source: 64Tgzu2FKh.exe, 00000000.00000003.855612399.000000000299D000.00000004.00000020.00020000.00000000.sdmp, bn.txt.0.dr | String found in binary or memory: http://www.oruddho.com |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.00000000005F2000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.00000000005F2000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd |
Source: certreq.exe, 0000000C.00000003.2362710242.0000022346F02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discord.com |
Source: certreq.exe, 0000000C.00000003.2362710242.0000022346F02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://discordapp.com |
Source: certreq.exe, 0000000C.00000003.2358519610.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2364067131.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2294813354.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2381391720.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2347137342.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2337010943.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2348460528.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2293648309.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2323288558.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2367034008.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2356041253.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2309566932.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2368527161.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2281491024.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2360225839.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2325891080.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2403232155.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2361474795.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2391200900.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2277711632.0000022346F02000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2271900087.0000022346F02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://http:///etc/puk.keyGET13ConnectionupgradeUpgradewebsocketUser-AgentAccept-Encodinggzip |
Source: certreq.exe, 0000000C.00000003.2269437994.0000022346BC9000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 0000000C.00000003.2262285186.0000022346BCF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://http:///etc/puk.keyMachineGuid |
Source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp | String found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214 |
Source: unknown | DNS traffic detected: queries for: bluemaxxlaser.com |
Source: global traffic | HTTP traffic detected: GET /rh/rheu.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Host: bluemaxxlaser.com |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_004053EF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_004053EF |
Source: 64Tgzu2FKh.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 1232 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_0040333D |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_00406956 | 0_2_00406956 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_00404C2C | 0_2_00404C2C |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E62C32 | 12_3_0000022344E62C32 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E62792 | 12_3_0000022344E62792 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E64A10 | 12_3_0000022344E64A10 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E61B9C | 12_3_0000022344E61B9C |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E624ED | 12_3_0000022344E624ED |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E65E54 | 12_3_0000022344E65E54 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E65554 | 12_3_0000022344E65554 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E658D4 | 12_3_0000022344E658D4 |
Source: C:\Windows\System32\certreq.exe | Code function: 12_3_0000022344E630A7 RtlRestoreThreadPreferredUILanguages,RtlAllocateHeap,RtlAllocateHeap,NtAcceptConnectPort,NtAcceptConnectPort,NtAcceptConnectPort,RtlDeleteBoundaryDescriptor,RtlDeleteBoundaryDescriptor, | 12_3_0000022344E630A7 |
Source: 64Tgzu2FKh.exe, 00000000.00000003.853287489.000000000299D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameSharpDX.DXGI.dll< vs 64Tgzu2FKh.exe |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: 64Tgzu2FKh.exe | Virustotal: Detection: 12% |
Source: 64Tgzu2FKh.exe | ReversingLabs: Detection: 13% |
Source: 64Tgzu2FKh.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: unknown | Process created: C:\Users\user\Desktop\64Tgzu2FKh.exe C:\Users\user\Desktop\64Tgzu2FKh.exe | |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process created: C:\Users\user\Desktop\64Tgzu2FKh.exe C:\Users\user\Desktop\64Tgzu2FKh.exe | |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process created: C:\Windows\System32\certreq.exe C:\Windows\system32\certreq.exe | |
Source: C:\Windows\System32\certreq.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 1232 | |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process created: C:\Windows\System32\certreq.exe C:\Windows\system32\certreq.exe | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_0040333D |
Source: classification engine | Classification label: mal100.troj.spyw.evad.winEXE@6/8@1/2 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_004046B0 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, | 0_2_004046B0 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9616:304:WilStaging_02 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9616:120:WilError_03 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Mutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6} |
Source: 64Tgzu2FKh.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdbLm source: 64Tgzu2FKh.exe, 00000000.00000003.853287489.000000000299D000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.0.dr |
Source: | Binary string: mshtml.pdb source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: C:\Code\SharpDX\Source\SharpDX.DXGI\bin\Release\SharpDX.DXGI.pdb source: 64Tgzu2FKh.exe, 00000000.00000003.853287489.000000000299D000.00000004.00000020.00020000.00000000.sdmp, SharpDX.DXGI.dll.0.dr |
Source: | Binary string: mshtml.pdbUGP source: 64Tgzu2FKh.exe, 0000000B.00000001.1367127206.0000000000649000.00000020.00000001.01000000.00000006.sdmp |
Source: Yara match | File source: 00000000.00000002.1536218122.0000000008A31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_10002DE0 push eax; ret | 0_2_10002E0E |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_0008582C push ebp; iretd | 11_3_0008582D |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00083854 push eax; ret | 11_3_00083955 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_000838BC push eax; ret | 11_3_00083955 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00084ABD push dword ptr [edx+ebp+3Bh]; retf | 11_3_00084ACA |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00085323 push es; retf | 11_3_00085324 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00085366 push esp; retf | 11_3_00085376 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00082F9A push esi; retf | 11_3_00082F9B |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_00082FA6 push es; retf | 11_3_00082FAF |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 11_3_000853EE pushad ; ret | 11_3_000853F1 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Code function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, | 0_2_10001B18 |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File created: C:\Users\user\AppData\Local\Temp\nseEF5D.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\spilplatform\Thenceforth\Troubleshooting\Egueiite240\SharpDX.DXGI.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Langust | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Langust\Grade | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\certreq.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: Yara match | File source: 0000000B.00000003.2050058689.00000000000E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 64Tgzu2FKh.exe PID: 4832, type: MEMORYSTR |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File opened: C:\Program Files\Qemu-ga\qemu-ga.exe | Jump to behavior |
Source: C:\Users\user\Desktop\64Tgzu2FKh.exe | File opened: C:\Program Files\qga\qga.exe | Jump to behavior |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.1512296461.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2046614643.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1553353357.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCMON.EXE |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035ADD000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1512296461.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2046614643.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1553353357.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXE |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035ADD000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1512296461.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2046614643.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1553353357.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXE |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035ADD000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1512296461.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2047031244.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.2046614643.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp, 64Tgzu2FKh.exe, 0000000B.00000003.1553353357.0000000035AEE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXE |
Source: 64Tgzu2FKh.exe, 0000000B.00000003.2050058689.00000000000E2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WQLRANDOMRANDOM NAME%THISISANINVALIDFILENAME?[]<>@\;*!-{}#:/~%%THISISANINVALIDENVIRONMENTVARIABLENAME?[]<>@\;*!-{}#:/~%CMDVRT32.DLLCMDVRT64.DLLWPESPY.DLLVMCHECK.DLLPSTOREC.DLLDIR_WATCH.DLLAPI_LOG.DLLDBGHELP.DLLSBIEDLL.DLLSNXHK.DLLAVGHOOKA.DLLAVGHOOKX.DLLTESTAPP.EXEMYAPP.EXEKLAVME.EXETEST.EXEMALWARE.EXESANDBOX.EXEBOT.EXESAMPLE.EXEJOHN DOEVIRUSTEST USERMALTESTMALWARESAND BOXUSERTIMMYPETER WILSONMILOZSMILLERJOHNSONIT-ADMINHONG LEEHAPUBWSEMILYSANDBOXCURRENTUSERTEQUILABOOMBOOMFORTINETWIN7-TRAPSMUELLER-PCJOHN-PCHANSPETER-PCHAL9TH7SILVIAXPAMAST-SCSANDBOXWILBERT-SCCWSXXXXX-OXNMSDBOXCUCKOOCOMPUTERNAMEANDYANONYMOUSUSERC:\A\FOOBAR.GIFC:\A\FOOBAR.DOCC:\A\FOOBAR.BMPC:\123\EMAIL.DOCXC:\123\EMAIL.DOCC:\EMAIL.HTMC:\EMAIL.DOCC:\LOADDLL.EXEC:\TAKE_SCREENSHOT.PS1JOHNKLONE_X64-PCSYSTEMITADMINSWSCWILBERNUMBEROFCORESSELECT * FROM WIN32_PROCESSORROOT\CIMV2VIRTUALQEMUVMWAREVBOXVBOXVBOXVBOXPARALLELS HVPRL HYPERV XENVMMXENVMMVMWAREVMWAREMICROSOFT HVKVMKVMKVMA M IVIRTUALXEN0PARALLELSVMWARESERIALNUMBERSELECT * FROM WIN32_BIOSHVM DOMUVIRTUALBOXMODELSELECT * FROM WIN32_COMPUTERSYSTEMQEMUINNOTEK GMBHMANUFACTURERPROCESSORIDVMWXENVIRTIOSYSTEM\CURRENTCONTROLSET\ENUM\SCSISYSTEM\CURRENTCONTROLSET\ENUM\IDESELECT * FROM CIM_PHYSICALCONNECTOR06/23/99SYSTEMBIOSDATEVIRTUALBOXVIDEOBIOSVERSIONSYSTEMBIOSVERSIONIDENTIFIERHARDWARE\DEVICEMAP\SCSI\SCSI PORT 0\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0HARDWARE\DESCRIPTION\SYSTEMVBOXSYSTEM\CONTROLSET001\SERVICES\VBOXVIDEOSYSTEM\CONTROLSET001\SERVICES\VBOXSFSYSTEM\CONTROLSET001\SERVICES\VBOXSERVICESYSTEM\CONTROLSET001\SERVICES\VBOXMOUSESYSTEM\CONTROLSET001\SERVICES\VBOXGUESTSOFTWARE\ORACLE\VIRTUALBOX GUEST ADDITIONSHARDWARE\ACPI\RSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__SYSTEM32\VBOXCONTROL.EXESYSTEM32\VBOXTRAY.EXESYSTEM32\VBOXSERVICE.EXESYSTEM32\VBOXOGLPASSTHROUGHSPU.DLLSYSTEM32\VBOXOGLPACKSPU.DLLSYSTEM32\VBOXOGLFEEDBACKSPU.DLLSYSTEM32\VBOXOGLERRORSPU.DLLSYSTEM32\VBOXOGLCRUTIL.DLLSYSTEM32\VBOXOGLARRAYSPU.DLLSYSTEM32\VBOXOGL.DLLSYSTEM32\VBOXMRXNP.DLLSYSTEM32\VBOXHOOK.DLLSYSTEM32\VBOXDISP.DLLSYSTEM32\DRIVERS\VBOXVIDEO.SYSSYSTEM32\DRIVERS\VBOXSF.SYSSYSTEM32\DRIVERS\VBOXGUEST.SYSSYSTEM32\DRIVERS\VBOXMOUSE.SYS%PROGRAMW6432%\\.\PIPE\VBOXTRAYIPC\\.\VBOXTRAYIPC\\.\PIPE\VBOXMINIRDDN\\.\VBOXGUEST\\.\VBOXMINIRDRDNVBOXTRAYTOOLWNDVBOXTRAYTOOLWNDCLASSVIRTUALBOX SHARED FOLDERSVBOXTRAY.EXEVBOXSERVICE.EXEPCI\VEN_80EE&DEV_CAFEDEVICEIDSELECT * FROM WIN32_PNPENTITYOPENHCD82371SB82441FX82801FBNAMEVEN_VBOXPNPDEVICEIDCAPTIONSELECT |