![]() ![]() ![]() String found in binary or memory: Facebook.3 17180B0BB4 86_8xx8rvf yw5nnt!App 6556 equal s ( Facebook) String found in binary or memory: youtube d ownloader a pokemon go company a free r ide games bar toolba r 811 too lbar 7go games 6s4 p 4shared toolbar 4hd 4b534 33553_2044 3dslots2 go 337 2 yourface 24x7help 24x7 help 24seven s avings 24 24 softwar e 2345exp lorer 1cl ickmoviedo wnloader.c equals ww w.youtube. ![]() ![]() Behaviorgraph top1 signatures2 2 Behavior Graph ID: 141385 Sample: Kai.exe Startdate: Architecture: WINDOWS Score: 72 34 Antivirus or Machine Learning detection for sample 2->34 36 Found strings related to Crypto-Mining 2->36 38 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->38 40 Antivirus or Machine Learning detection for unpacked file 2->40 6 SearchUI.exe 2->6 started 9 explorer.exe 14 135 2->9 started 11 ctfmon.exe 2->11 started 13 5 other processes 2->13 process3 file4 42 Maps a DLL or memory area into another process 6->42 16 wermgr.exe 6->16 started 44 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 9->44 46 Monitors registry run keys for changes 11->46 26 C:\Kai\Hives26TREGOPT.EXE, PE32 13->26 dropped 28 C:\Kai\HivesRUNT.EXE, PE32 13->28 dropped 30 C:\Kai\HivesRDNT.E_E, PE32 13->30 dropped 32 C:\Kai\Hives\AUTOBACK.EXE, PE32 13->32 dropped 18 conhost.exe 13->18 started 20 WerFault.exe 13->20 started 22 wermgr.exe 13->22 started 24 WerFault.exe 13->24 started signatures5 process6įound strings which match to known social media urls ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |