Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00419030 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA, |
0_2_00419030 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040C920 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA, |
0_2_0040C920 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040A210 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, |
0_2_0040A210 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004072A0 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree, |
0_2_004072A0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040A2B0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree, |
0_2_0040A2B0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02409297 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA, |
0_2_02409297 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FA477 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, |
0_2_023FA477 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FA517 CryptUnprotectData,LocalAlloc,memcpy,LocalFree, |
0_2_023FA517 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023F7507 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree, |
0_2_023F7507 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FCB87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat, |
0_2_023FCB87 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, |
0_2_004140F0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_0040E530 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040BE40 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_0040EE20 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00414B60 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_00413B00 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040DF10 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00401710 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, |
0_2_004147C0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040DB80 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040F7B0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose, |
0_2_02404357 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_023FC0A7 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_023FF087 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023FE177 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_023FE797 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023FFA17 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen, |
0_2_02404A27 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023F1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023F1977 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02403D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_02403D67 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_02404DC7 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_023FDDE7 |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105 |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/ |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php%: |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php4 |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.phpT |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.phpk: |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/7: |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/AL |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105/d:iU |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://77.83.175.105; |
Source: Amcache.hve.3.dr |
String found in binary or memory: http://upx.sf.net |
Source: 8WOUWb5iEv.exe, 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp |
String found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_024382DF |
0_2_024382DF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0246134F |
0_2_0246134F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0246A08F |
0_2_0246A08F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0244B1CF |
0_2_0244B1CF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_024211DF |
0_2_024211DF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0245A19F |
0_2_0245A19F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_024336EF |
0_2_024336EF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0247A76F |
0_2_0247A76F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0242F4FF |
0_2_0242F4FF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0244A5FF |
0_2_0244A5FF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0242159F |
0_2_0242159F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0245CA0F |
0_2_0245CA0F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02433A0F |
0_2_02433A0F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02469AAF |
0_2_02469AAF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02478B64 |
0_2_02478B64 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02435B2F |
0_2_02435B2F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0246C805 |
0_2_0246C805 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0241D9AB |
0_2_0241D9AB |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0245FFEF |
0_2_0245FFEF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02465C00 |
0_2_02465C00 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0244AD0F |
0_2_0244AD0F |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0245ED3D |
0_2_0245ED3D |
Source: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: msimg32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: msvcr100.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419F20 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419F20 |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose, |
0_2_004140F0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_0040E530 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040BE40 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_0040EE20 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00414B60 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_00413B00 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040DF10 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_00401710 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA, |
0_2_004147C0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_0040DB80 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_0040F7B0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose, |
0_2_02404357 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose, |
0_2_023FC0A7 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose, |
0_2_023FF087 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023FE177 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, |
0_2_023FE797 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023FFA17 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen, |
0_2_02404A27 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023F1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_023F1977 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02403D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose, |
0_2_02403D67 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02404DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose, |
0_2_02404DC7 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_023FDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, |
0_2_023FDDE7 |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAWHH |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.3.dr |
Binary or memory string: vmci.syshbin |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware, Inc. |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.3.dr |
Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.3.dr |
Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.3.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.3.dr |
Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: vmci.sys |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.3.dr |
Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.3.dr |
Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware20,1 |
Source: Amcache.hve.3.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.3.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: VMwareVMware |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.3.dr |
Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.3.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.3.dr |
Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, |
0_2_00419F20 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0041B058 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0041B058 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0041D21A SetUnhandledExceptionFilter, |
0_2_0041D21A |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0041B63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_0041B63A |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0240B2BF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_0240B2BF |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0240D481 SetUnhandledExceptionFilter, |
0_2_0240D481 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_0240B8A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_0240B8A1 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_004198E0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle, |
0_2_004198E0 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_00419790 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle, |
0_2_00419790 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_02409B47 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle, |
0_2_02409B47 |
Source: C:\Users\user\Desktop\8WOUWb5iEv.exe |
Code function: 0_2_024099F7 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle, |
0_2_024099F7 |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.8WOUWb5iEv.exe.2500000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.8WOUWb5iEv.exe.2500000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.23f0e67.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.23f0e67.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 8WOUWb5iEv.exe PID: 6720, type: MEMORYSTR |
Source: Yara match |
File source: dump.pcap, type: PCAP |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.400000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.8WOUWb5iEv.exe.2500000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.3.8WOUWb5iEv.exe.2500000.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.23f0e67.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.400000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.8WOUWb5iEv.exe.23f0e67.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: 8WOUWb5iEv.exe PID: 6720, type: MEMORYSTR |
Source: Yara match |
File source: dump.pcap, type: PCAP |