Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Avira: detected |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00402402 FindFirstFileW,GetLastError,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEm,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZNSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEED1Ev,_ZNKSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEE5c_strEv,DeleteFileW,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,GetLastError,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZNSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEED1Ev,FindNextFileW,FindClose, |
0_2_00402402 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00401C0A _ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEv,FindFirstFileA,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZStlsIcSt11char_traitsIcESaIcEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSolsEPFRSoS_E,_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEv,DeleteFileA,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,GetLastError,_ZNSolsEm,_ZNSolsEPFRSoS_E,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZNSolsEPFRSoS_E,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,FindNextFileA,FindClose,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZStlsIcSt11char_traitsIcESaIcEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSolsEPFRSoS_E,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev, |
0_2_00401C0A |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
String found in binary or memory: https://raw.githubusercontent.com/devxdfps/pqsup/main/FinalizarUmProcesso.exe |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
String found in binary or memory: https://raw.githubusercontent.com/devxdfps/pqsup/main/FinalizarUmProcesso.exeDownload |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: Number of sections : 15 > 10 |
Source: classification engine |
Classification label: mal48.winEXE@2/0@0/0 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7540:120:WilError_03 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe" |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Section loaded: libgcc_s_seh-1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Section loaded: libwinpthread-1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Section loaded: libstdc++-6.dll |
Jump to behavior |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: .xdata |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /4 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /19 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /31 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /45 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /57 |
Source: SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Static PE information: section name: /70 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00402402 FindFirstFileW,GetLastError,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEm,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZNSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEED1Ev,_ZNKSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEE5c_strEv,DeleteFileW,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,GetLastError,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZStlsIwSt11char_traitsIwESaIwEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZStlsIwSt11char_traitsIwEERSt13basic_ostreamIT_T0_ES6_PKS3_,_ZNSt13basic_ostreamIwSt11char_traitsIwEElsEPFRS2_S3_E,_ZNSt7__cxx1112basic_stringIwSt11char_traitsIwESaIwEED1Ev,FindNextFileW,FindClose, |
0_2_00402402 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00401C0A _ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEv,FindFirstFileA,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSaIcEC1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_,_ZNSaIcED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZStlsIcSt11char_traitsIcESaIcEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSolsEPFRSoS_E,_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEv,DeleteFileA,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,GetLastError,_ZNSolsEm,_ZNSolsEPFRSoS_E,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZNSolsEPFRSoS_E,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,FindNextFileA,FindClose,_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc,_ZStlsIcSt11char_traitsIcESaIcEERSt13basic_ostreamIT_T0_ES7_RKNSt7__cxx1112basic_stringIS4_S5_T1_EE,_ZNSolsEPFRSoS_E,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev,_ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1Ev, |
0_2_00401C0A |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00404259 SetUnhandledExceptionFilter, |
0_2_00404259 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_0040A50C SetUnhandledExceptionFilter,Sleep,TerminateProcess,TlsGetValue,UnhandledExceptionFilter,VirtualProtect,VirtualQuery,__C_specific_handler,__getmainargs,__initenv, |
0_2_0040A50C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_0040A50C SetUnhandledExceptionFilter,Sleep,TerminateProcess,TlsGetValue,UnhandledExceptionFilter,VirtualProtect,VirtualQuery,__C_specific_handler,__getmainargs,__initenv, |
0_2_0040A50C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_0040A50C SetUnhandledExceptionFilter,Sleep,TerminateProcess,TlsGetValue,UnhandledExceptionFilter,VirtualProtect,VirtualQuery,__C_specific_handler,__getmainargs,__initenv, |
0_2_0040A50C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00402DE0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort, |
0_2_00402DE0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,_initterm,GetStartupInfoA, |
0_2_00401180 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Heuristic.HEUR.AGEN.1319884.13784.6616.exe |
Code function: 0_2_00402D00 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, |
0_2_00402D00 |