Source: g3r7OOQiri.exe |
Virustotal: Detection: 15% |
Perma Link |
Source: g3r7OOQiri.exe |
Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE |
Source: |
Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269509283.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269586332.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269453181.000000000355F000.00000004.00000001.sdmp |
Source: |
Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269524012.000000000354D000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269596927.000000000354D000.00000004.00000001.sdmp |
Source: |
Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.269524012.000000000354D000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269596927.000000000354D000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269580887.0000000003541000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269484163.0000000003541000.00000004.00000001.sdmp |
Source: |
Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.269509283.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269586332.0000000003547000.00000004.00000001.sdmp |
Source: |
Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp |
Source: |
Binary string: upwntdll.pdb source: WerFault.exe, 00000003.00000003.269391178.000000000355D000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdbk source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.269580887.0000000003541000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269484163.0000000003541000.00000004.00000001.sdmp |
Source: WerFault.exe, 00000003.00000003.283148918.000000000353A000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000002.285011314.000000000353A000.00000004.00000001.sdmp |
String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: Amcache.hve.3.dr |
String found in binary or memory: http://upx.sf.net |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE |
Source: g3r7OOQiri.exe |
Static PE information: No import functions for PE file found |
Source: C:\Users\user\Desktop\g3r7OOQiri.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 224 |
Source: g3r7OOQiri.exe |
Static PE information: Number of sections : 14 > 10 |
Source: g3r7OOQiri.exe |
Static PE information: Data appended to the last section found |
Source: g3r7OOQiri.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0 |
Source: g3r7OOQiri.exe |
Static PE information: Section: ZLIB complexity 1.00042941046 |
Source: g3r7OOQiri.exe |
Static PE information: Section: ZLIB complexity 1.004296875 |
Source: g3r7OOQiri.exe |
Static PE information: Section: ZLIB complexity 1.00097595599 |
Source: g3r7OOQiri.exe |
Virustotal: Detection: 15% |
Source: C:\Users\user\Desktop\g3r7OOQiri.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\g3r7OOQiri.exe "C:\Users\user\Desktop\g3r7OOQiri.exe" |
Source: C:\Users\user\Desktop\g3r7OOQiri.exe |
Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 224 |
Source: C:\Windows\SysWOW64\WerFault.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4440 |
Source: C:\Windows\SysWOW64\WerFault.exe |
File created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER891B.tmp |
Jump to behavior |
Source: classification engine |
Classification label: mal56.winEXE@2/6@0/0 |
Source: C:\Windows\SysWOW64\WerFault.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: g3r7OOQiri.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269509283.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269586332.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269453181.000000000355F000.00000004.00000001.sdmp |
Source: |
Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269524012.000000000354D000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269596927.000000000354D000.00000004.00000001.sdmp |
Source: |
Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.269524012.000000000354D000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269596927.000000000354D000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269580887.0000000003541000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269484163.0000000003541000.00000004.00000001.sdmp |
Source: |
Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.269509283.0000000003547000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269586332.0000000003547000.00000004.00000001.sdmp |
Source: |
Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp |
Source: |
Binary string: upwntdll.pdb source: WerFault.exe, 00000003.00000003.269391178.000000000355D000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdbk source: WerFault.exe, 00000003.00000003.271148063.00000000054A1000.00000004.00000001.sdmp |
Source: |
Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.269580887.0000000003541000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000003.269484163.0000000003541000.00000004.00000001.sdmp |
Source: g3r7OOQiri.exe |
Static PE information: real checksum: 0x14efe5 should be: 0x1c55f |
Source: C:\Windows\SysWOW64\WerFault.exe |
Code function: 3_2_02F2E82B pushad ; ret |
3_2_02F2E844 |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: |
Source: g3r7OOQiri.exe |
Static PE information: section name: .ShqA6WN |
Source: g3r7OOQiri.exe |
Static PE information: section name: .adata |
Source: initial sample |
Static PE information: section name: entropy: 7.9974253827 |
Source: initial sample |
Static PE information: section name: entropy: 7.92908677458 |
Source: initial sample |
Static PE information: section name: entropy: 7.98297122027 |
Source: C:\Windows\SysWOW64\WerFault.exe |
Registry key monitored for changes: HKEY_CURRENT_USER_Classes |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware, Inc. |
Source: WerFault.exe, 00000003.00000003.283185366.000000000356D000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000002.285040839.000000000356D000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW0 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin |
Source: Amcache.hve.3.dr |
Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware7,1 |
Source: Amcache.hve.3.dr |
Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.3.dr |
Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: WerFault.exe, 00000003.00000003.283240472.000000000351E000.00000004.00000001.sdmp, WerFault.exe, 00000003.00000002.284995893.000000000352A000.00000004.00000020.sdmp |
Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware, Inc.me |
Source: WerFault.exe, 00000003.00000003.281244930.000000000356D000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll+ |
Source: Amcache.hve.3.dr |
Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.3.dr |
Binary or memory string: VMware-42 35 bb 32 33 75 d2 27-52 00 3c e2 4b d4 32 71 |
Source: Amcache.hve.3.dr |
Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: C:\Users\user\Desktop\g3r7OOQiri.exe |
Process queried: DebugPort |
Jump to behavior |
Source: Amcache.hve.3.dr |
Binary or memory string: msmpeng.exe |
Source: Amcache.hve.3.dr |
Binary or memory string: c:\program files\windows defender\msmpeng.exe |