Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb8 source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25526698824.000000000142D000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb969588382-3778222414-1001_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdbF source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb^I source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25526698824.000000000142D000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: applaunch.pdb source: injectorQWEEX.exe, 00000000.00000002.25545351239.0000000004541000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25545351239.000000000459D000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.25450375781.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24698088273.00000000045BE000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.15.156.127 |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faulth |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/ |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/exa |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/ |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field1 |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field1LR |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field1Response |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field1ResponsetYHq |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2 |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2D |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2LR |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2Response |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2d |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field2rm |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field3 |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field3LR |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.000000000391B000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.00000000037A2000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003B1E000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003A92000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field3Response |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://tempuri.org/example/Field3nm |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://api.ip.sb/ip |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://discord.com/api/v9/users/ |
Source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Matched rule: Detects zgRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2C4D0 |
0_2_00D2C4D0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D28890 |
0_2_00D28890 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D274B0 |
0_2_00D274B0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2EC50 |
0_2_00D2EC50 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D1A840 |
0_2_00D1A840 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D26030 |
0_2_00D26030 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2B030 |
0_2_00D2B030 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D25C20 |
0_2_00D25C20 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2A1E0 |
0_2_00D2A1E0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D295E0 |
0_2_00D295E0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D19DB0 |
0_2_00D19DB0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D3D151 |
0_2_00D3D151 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2B6C0 |
0_2_00D2B6C0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2BA90 |
0_2_00D2BA90 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D156B0 |
0_2_00D156B0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D27660 |
0_2_00D27660 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D1DA10 |
0_2_00D1DA10 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D253D0 |
0_2_00D253D0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D26BC0 |
0_2_00D26BC0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D29B10 |
0_2_00D29B10 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D24B10 |
0_2_00D24B10 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D26730 |
0_2_00D26730 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2E730 |
0_2_00D2E730 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D28F20 |
0_2_00D28F20 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D26320 |
0_2_00D26320 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_03340870 |
0_2_03340870 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_03340880 |
0_2_03340880 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_03347668 |
0_2_03347668 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0334765A |
0_2_0334765A |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_069475B8 |
0_2_069475B8 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0694A3F8 |
0_2_0694A3F8 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0694A3EA |
0_2_0694A3EA |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_069481F8 |
0_2_069481F8 |
Source: injectorQWEEX.exe, 00000000.00000002.25545351239.0000000004541000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameapplaunch.exeT vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000002.25524783931.00000000010D5000.00000004.00000010.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameGristles.exe" vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000002.25545351239.000000000459D000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameapplaunch.exeT vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000003.25450375781.00000000045BE000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameapplaunch.exeT vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000002.25526194072.00000000013BD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000002.25525360540.00000000012C6000.00000002.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameGristles.exe" vs injectorQWEEX.exe |
Source: injectorQWEEX.exe, 00000000.00000003.24698088273.00000000045BE000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameapplaunch.exeT vs injectorQWEEX.exe |
Source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT |
Source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, Strings.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, --.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, --.cs |
Cryptographic APIs: 'CreateDecryptor' |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: edgegdi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb8 source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25526698824.000000000142D000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb969588382-3778222414-1001_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdbF source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\System.ServiceModel.pdb^I source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D15000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000003.24411418172.0000000001428000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25526698824.000000000142D000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24412348172.000000000142C000.00000004.00000020.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409019947.0000000001428000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: applaunch.pdb source: injectorQWEEX.exe, 00000000.00000002.25545351239.0000000004541000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000002.25545351239.000000000459D000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.25450375781.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24698088273.00000000045BE000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D3D861 push ecx; ret |
0_2_00D3D874 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0334F4F0 push esp; retf |
0_2_0334F4F1 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0694DEC8 push es; retf |
0_2_0694DF7C |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_06946A60 push es; retn 0004h |
0_2_06946FB0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0694F280 push es; ret |
0_2_0694F290 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_06946FA0 push es; retn 0004h |
0_2_06946FB0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_06941C10 push es; ret |
0_2_06941C20 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_06941BB0 push es; ret |
0_2_06941BE0 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_06941BF0 push es; ret |
0_2_06941C00 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_0694E88A push eax; ret |
0_2_0694E891 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: injectorQWEEX.exe, 00000000.00000002.25529253904.0000000003541000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: \qemu-ga.exe |
Source: injectorQWEEX.exe, 00000000.00000002.25546885364.0000000005D57000.00000004.00000800.00020000.00000000.sdmp, injectorQWEEX.exe, 00000000.00000003.24409635498.0000000005D57000.00000004.00000800.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlliis |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2FCEC SetUnhandledExceptionFilter, |
0_2_00D2FCEC |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2F6B2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00D2F6B2 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D33BE6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00D33BE6 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Code function: 0_2_00D2FB90 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00D2FB90 |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\injectorQWEEX.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.25525253706.0000000001242000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.25524783931.0000000001051000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.25525253706.0000000001242000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.25524783931.0000000001051000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: injectorQWEEX.exe PID: 1304, type: MEMORYSTR |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.25525253706.0000000001242000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.25524783931.0000000001051000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1240000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.injectorQWEEX.exe.1052998.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.25525253706.0000000001242000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.25524783931.0000000001051000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: injectorQWEEX.exe PID: 1304, type: MEMORYSTR |