Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: .pdbz?x source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 131.253.33.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 204.79.197.203 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 20.189.173.27 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 2.17.190.73 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 172.64.149.23 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 52.113.196.254 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.227.252.199 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0# |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0# |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0# |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0# |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/ |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.org/US |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.orgk |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.orgptography |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E531F1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E55E73000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898FA0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.00000001409BB000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894681000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr | String found in binary or memory: https://sectigo.com/CPS0 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DD97080 | 0_2_00007FFC3DD97080 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DD90510 | 0_2_00007FFC3DD90510 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DD9D0F0 | 0_2_00007FFC3DD9D0F0 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DDB73C9 | 9_2_00007FFC3DDB73C9 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DDBBDD4 | 9_2_00007FFC3DDBBDD4 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DD97080 | 9_2_00007FFC3DD97080 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DD90510 | 9_2_00007FFC3DD90510 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DD9D0F0 | 9_2_00007FFC3DD9D0F0 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF59BB8 | 9_2_00007FFC3DF59BB8 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF59BD8 | 9_2_00007FFC3DF59BD8 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF59C18 | 9_2_00007FFC3DF59C18 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5DFD1 | 9_2_00007FFC3DF5DFD1 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5DFF0 | 9_2_00007FFC3DF5DFF0 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5781D | 9_2_00007FFC3DF5781D |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF51C8D | 9_2_00007FFC3DF51C8D |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5EE48 | 9_2_00007FFC3DF5EE48 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5EE58 | 9_2_00007FFC3DF5EE58 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5830F | 9_2_00007FFC3DF5830F |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF5D214 | 9_2_00007FFC3DF5D214 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF6CD10 | 9_2_00007FFC3DF6CD10 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF71B2D | 9_2_00007FFC3DF71B2D |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF6D449 | 9_2_00007FFC3DF6D449 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF782E5 | 9_2_00007FFC3DF782E5 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF731A1 | 9_2_00007FFC3DF731A1 |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameRdvlcvkrhps.dll" vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000000.1194583552.0000018E406DC000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenametl_test_video.exe: vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Binary or memory string: OriginalFilenametl_test_video.exe: vs SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ITaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask' |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskFolder.cs | Task registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder' |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, Task.cs | Task registration methods: 'RegisterChanges', 'CreateTask' |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskService.cs | Task registration methods: 'CreateFromToken' |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E559D8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.00000188952B8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898B4B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.0000000140000000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E559D8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.00000188952B8000.00000004.00000800.00020000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018898B4B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000B.00000002.1359903279.0000000140000000.00000040.00000400.00020000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q); |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe" | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overmelod.vbs" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\Temp\overmelod.exe "C:\Users\user\AppData\Local\Temp\overmelod.exe" | |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\Temp\overmelod.exe "C:\Users\user\AppData\Local\Temp\overmelod.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328579698.0000018E40B20000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: protobuf-net.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E54FD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1328394989.0000018E40AB0000.00000004.08000000.00040000.00000000.sdmp, overmelod.exe, 00000009.00000002.1416648850.0000018894791000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: .pdbz?x source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, overmelod.exe.0.dr |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40b20000.1.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeModel.cs | .Net Code: TryDeserializeList |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, ListDecorator.cs | .Net Code: Read |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs | .Net Code: CreateInstance |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateInstance |
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e40ab0000.0.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateIfNull |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe.18e5b780000.8.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1344510463.0000018E54D9E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1328830902.0000018E42421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1655849966.0000018E5B780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.1416648850.0000018895C72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe PID: 6700, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: overmelod.exe PID: 7468, type: MEMORYSTR |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DD900BD pushad ; iretd | 0_2_00007FFC3DD900C1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DE3C350 push es; ret | 0_2_00007FFC3DE3C351 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DF46F75 push eax; iretd | 0_2_00007FFC3DF46F76 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Code function: 0_2_00007FFC3DF4B670 push ds; iretd | 0_2_00007FFC3DF4B671 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DDC3E78 pushad ; retf | 9_2_00007FFC3DDC3F59 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DDC55CB push ebx; iretd | 9_2_00007FFC3DDC55DA |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DDC3F6D pushad ; retf | 9_2_00007FFC3DDC3F59 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DD900BD pushad ; iretd | 9_2_00007FFC3DD900C1 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF58C50 push eax; ret | 9_2_00007FFC3DF58CBC |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF46F75 push eax; iretd | 9_2_00007FFC3DF46F76 |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF85487 push ds; iretd | 9_2_00007FFC3DF8556F |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Code function: 9_2_00007FFC3DF75921 push ds; retf | 9_2_00007FFC3DF7596F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: wscript.exe, 00000007.00000002.1346135673.0000022E82374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}. |
Source: MSBuild.exe, 0000000B.00000002.1393835741.000001A0F3EE8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>>A |
Source: SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe, 00000000.00000002.1344510463.0000018E529ED000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmCipcst1pNSXsKUbtH |
Source: wscript.exe, 00000007.00000002.1346135673.0000022E82374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\- |
Source: overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware|VIRTUAL|A M I|Xen |
Source: overmelod.exe, 00000009.00000002.1371837193.0000018884671000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: Microsoft|VMWare|Virtual |
Source: MSBuild.exe, 00000008.00000002.2437053337.000002AB72CDF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZZ |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQueryValueKey: Direct from: 0x7FFC9B783695 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtUnmapViewOfSection: Direct from: 0x7FFC3DF9F1B6 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtResumeThread: Direct from: 0x7FFC3DF9E44C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtClose: Direct from: 0x7FFC9B6D0CB8 | |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtSetInformationProcess: Direct from: 0x7FFC9D2DFF46 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtProtectVirtualMemory: Direct from: 0x7FFC9D2E0906 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtProtectVirtualMemory: Direct from: 0x7FFC3DF9B599 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQueryAttributesFile: Direct from: 0x7FFC9D35BC4A | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtOpenKeyEx: Direct from: 0x7FFC9B787FC1 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtWriteVirtualMemory: Direct from: 0x7FFC3DF9D632 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtProtectVirtualMemory: Direct from: 0x7FFC3DF9D659 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtResumeThread: Direct from: 0x7FFC3DFA07FC | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtReadFile: Direct from: 0x7FFC9B77C9C8 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQueryValueKey: Direct from: 0x7FFC9B7855C5 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtDeviceIoControlFile: Direct from: 0x7FFC9D42F207 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtAdjustPrivilegesToken: Direct from: 0x7FFC9A841BEC | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtUnmapViewOfSection: Direct from: 0x7FFC3DF9CE06 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQueryValueKey: Direct from: 0x7FFC99DB1DC5 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtQueryVolumeInformationFile: Direct from: 0x7FFC9B78734C | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtSetInformationProcess: Direct from: 0x7FFC9D2DFF6B | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtSetTimerEx: Direct from: 0x7FFCC36E26A1 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtQueryInformationToken: Direct from: 0x7FFC9D3167CB | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtOpenFile: Direct from: 0x7FFC9D3632D3 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtClose: Direct from: 0x7FFC9AC99A3C | |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQuerySystemInformation: Direct from: 0x7FFC9D2A53EE | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtQuerySystemInformation: Direct from: 0x7FFC9A841285 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtOpenKeyEx: Direct from: 0x7FFC9D3587B7 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtProtectVirtualMemory: Direct from: 0x7FFC9D2DFF57 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtMapViewOfSection: Direct from: 0x7FFC9D37A7F5 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtDelayExecution: Direct from: 0x7FFC9D285073 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtSetContextThread: Direct from: 0x7FFC3DF9DBB6 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtReadFile: Direct from: 0x7FFC9D375F36 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtQueryValueKey: Direct from: 0x7FFC9B784413 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtCreateFile: Direct from: 0x7FFC9B78517F | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtClose: Direct from: 0x7FFC9B78713F | |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtClose: Direct from: 0x7FFC9D375F5A | |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | NtCreateFile: Direct from: 0x7FFC9D375FD7 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtSetContextThread: Direct from: 0x7FFC3DF9FF66 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | NtWriteVirtualMemory: Direct from: 0x7FFC3DF9F9E2 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140001000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140833000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140A8F000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140AD9000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B29000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B2A000 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.5298.17806.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: D791CA6010 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140000000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140001000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140833000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140A8F000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140AD9000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B29000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 140B2A000 | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\overmelod.exe | Memory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe base: 86F300E010 | Jump to behavior |