Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Analysis ID:1491035
MD5:eb2e78bbb601facb768bd61a8e38b372
SHA1:d51b9b3a138ae1bf345e768ee94efdced4853ff7
SHA256:09d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe (PID: 4672 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe" MD5: EB2E78BBB601FACB768BD61A8E38B372)
    • conhost.exe (PID: 4912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://tmpfiles.orgVirustotal: Detection: 5%Perma Link
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeReversingLabs: Detection: 34%
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeVirustotal: Detection: 32%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.8% probability
Source: unknownHTTPS traffic detected: 104.21.21.16:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\H3OX\source\repos\ConsoleApp3\ConsoleApp3\obj\Debug\ConsoleApp3.pdb%9?9 19_CorExeMainmscoree.dll source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: Binary string: C:\Users\H3OX\source\repos\ConsoleApp3\ConsoleApp3\obj\Debug\ConsoleApp3.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeCode function: 4x nop then jmp 008B0944h0_2_008B0848
Source: global trafficHTTP traffic detected: GET /dl/10700323/fixclient.bin HTTP/1.1Host: tmpfiles.orgConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 104.21.21.16 104.21.21.16
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /dl/10700323/fixclient.bin HTTP/1.1Host: tmpfiles.orgConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: tmpfiles.org
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 10 Aug 2024 16:21:11 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, privateCF-Cache-Status: BYPASSSet-Cookie: XSRF-TOKEN=eyJpdiI6ImR5YUF1RWF2NWZGMUk0WW8wdllqN2c9PSIsInZhbHVlIjoid1cyQ09CUmpKM0l6eThESG5nQU5BcG1hbmQwOXQyOFdPQXBFc0EraGhYYXp5enZ6NVI0NEpLd1ZzZjRnK0R6Z2F3bWhKM3A1ajJLTUd4Zy93UStjT1NXTjU5RWdmWUE2ZTUyZm5CN2FSRVFHOENwbjl3N2dabmJ1d1pEcW9EdWsiLCJtYWMiOiJiNzk3YjViYmZjNmY3MTg3YjM4N2YxMjM4NDFhNjQ2MjA3M2JjNGIxODJjNWM3NjVjMTU5ZDZmNmViZmFlYTY4In0%3D; expires=Sat, 10-Aug-2024 18:21:11 GMT; Max-Age=7200; path=/; samesite=laxSet-Cookie: tmpfiles_session=eyJpdiI6Ijl1VW1tU1c3dG90SFZ6Nll5N2g0Q1E9PSIsInZhbHVlIjoibjV6Nmd4WThKRk5KUkEweXJVQVZKRmF2MUFwcDJzU0dDcURQRDhJUkNBbjZvWllTdnFBSlo1UFVUZHlXcjRERzluRHNZRjJ6WGpUK2ZzaEpablkyWEQ4WDlLT0FEazNuOWRHN2JKZUZXNHRvNWdydjlPamRBYlBrTExtSTdwVXIiLCJtYWMiOiI4MjRiMDUzZDkzZjk3ZDhkZjVjYzgzM2EyYThlODA1NzM1MGRlNDE0Mjc0N2I3MDczNzRhMzdmM2I4YTczNWZmIn0%3D; expires=Sat, 10-Aug-2024 18:21:11 GMT; Max-Age=7200; path=/; httponly; samesite=laxReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yBESHOCB%2BbyhQr%2FkSzHteYBITO9aZqmmce0F9KhyQ876WjvB41Je%2Bkz9IRc9opDsT%2BxgXIRDbhmg2S3BKD7vlv5JPbw5kT4em%2BYgtmYrt5A%2FiFH0vpGTlkQ5GGijhxg%3D"}],"group":"cf-nel","max_age":604800}
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.0000000002551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tmpfiles.org
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tmpfiles.orgd
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css2?family=Nunito&display=swap
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.0000000002551000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tmpfiles.org
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.0000000002551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tmpfiles.org/dl/10700323/fixclient.bin
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeString found in binary or memory: https://tmpfiles.org/dl/10700323/fixclient.bin9Failed
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownHTTPS traffic detected: 104.21.21.16:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048476946.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000000.2032571495.0000000000272000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameConsoleApp3.exe8 vs SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeBinary or memory string: OriginalFilenameConsoleApp3.exe8 vs SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: classification engineClassification label: mal68.evad.winEXE@2/1@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe.logJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4912:120:WilError_03
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeReversingLabs: Detection: 34%
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeVirustotal: Detection: 32%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeSection loaded: gpapi.dllJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\H3OX\source\repos\ConsoleApp3\ConsoleApp3\obj\Debug\ConsoleApp3.pdb%9?9 19_CorExeMainmscoree.dll source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: Binary string: C:\Users\H3OX\source\repos\ConsoleApp3\ConsoleApp3\obj\Debug\ConsoleApp3.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeStatic PE information: 0xC3A02D02 [Mon Jan 1 17:46:42 2074 UTC]
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeMemory allocated: 8B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeMemory allocated: 2550000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeMemory allocated: 4550000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe TID: 3448Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048476946.0000000000923000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, ShellCodeLoader.cs.Net Code: NT contains injection code
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, ShellCodeLoader.csReference to suspicious API methods: Imports.NtAllocateVirtualMemory(Imports.GetCurrentProcess(), ref ptr, IntPtr.Zero, ref RegionSize, (TypeAlloc)12288, PageProtection.PAGE_EXECUTE_READWRITE)
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, ShellCodeLoader.csReference to suspicious API methods: Imports.NtWriteVirtualMemory(Imports.GetCurrentProcess(), ptr, ShellCode, (UIntPtr)(ulong)ShellCode.Length, out var _)
Source: SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, ShellCodeLoader.csReference to suspicious API methods: Imports.NtProtectVirtualMemory(Imports.GetCurrentProcess(), ref ptr, ref RegionSize, PageProtection.PAGE_EXECUTE_READ, ref oldProtect)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe34%ReversingLabsByteCode-MSIL.Trojan.Zilla
SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe32%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
tmpfiles.org3%VirustotalBrowse
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://tmpfiles.org0%Avira URL Cloudsafe
https://tmpfiles.org/dl/10700323/fixclient.bin9Failed0%Avira URL Cloudsafe
https://tmpfiles.org0%Avira URL Cloudsafe
https://tmpfiles.org/dl/10700323/fixclient.bin0%Avira URL Cloudsafe
http://tmpfiles.orgd0%Avira URL Cloudsafe
https://tmpfiles.org/dl/10700323/fixclient.bin3%VirustotalBrowse
https://tmpfiles.org5%VirustotalBrowse
http://tmpfiles.org3%VirustotalBrowse
https://tmpfiles.org/dl/10700323/fixclient.bin9Failed3%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
tmpfiles.org
104.21.21.16
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://tmpfiles.org/dl/10700323/fixclient.binfalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://tmpfiles.org/dl/10700323/fixclient.bin9FailedSecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exefalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://tmpfiles.orgdSecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025CD000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://tmpfiles.orgSecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.0000000002551000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025C6000.00000004.00000800.00020000.00000000.sdmpfalse
  • 5%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://tmpfiles.orgSecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.00000000025CD000.00000004.00000800.00020000.00000000.sdmpfalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, 00000000.00000002.2048827777.0000000002551000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
104.21.21.16
tmpfiles.orgUnited States
13335CLOUDFLARENETUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1491035
Start date and time:2024-08-10 18:20:20 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
Detection:MAL
Classification:mal68.evad.winEXE@2/1@1/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 6
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Execution Graph export aborted for target SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe, PID 4672 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
104.21.21.16KMPrEVaSfH.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
    SecuriteInfo.com.Win32.PWSX-gen.24221.17365.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
      New_Text_Document_mod.exse.exeGet hashmaliciousAgentTesla, Amadey, Creal Stealer, Djvu, FormBook, Glupteba, GuLoaderBrowse
        https://aeindo.co.id/cvt/Get hashmaliciousUnknownBrowse
          https://kurindubaitullah.com/lpwx00Get hashmaliciousUnknownBrowse
            doc0987654321u.exeGet hashmaliciousUnknownBrowse
              starter.shGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                tmpfiles.orgmlk3kK6uLZ.exeGet hashmaliciousAmadey, Mars Stealer, PureLog Stealer, Quasar, RedLine, Stealc, VidarBrowse
                • 104.21.21.16
                KMPrEVaSfH.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                • 104.21.21.16
                SecuriteInfo.com.Win32.PWSX-gen.24221.17365.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
                • 104.21.21.16
                New_Text_Document_mod.exse.exeGet hashmaliciousAgentTesla, Amadey, Creal Stealer, Djvu, FormBook, Glupteba, GuLoaderBrowse
                • 104.21.21.16
                https://aeindo.co.id/cvt/Get hashmaliciousUnknownBrowse
                • 104.21.21.16
                https://pmb.stitmakrifatulilmi.ac.id/scv/Get hashmaliciousHTMLPhisherBrowse
                • 172.67.195.247
                https://central-lab.by/rstc/Get hashmaliciousUnknownBrowse
                • 172.67.195.247
                https://kurindubaitullah.com/lpwx00Get hashmaliciousUnknownBrowse
                • 104.21.21.16
                doc0987654321u.exeGet hashmaliciousUnknownBrowse
                • 104.21.21.16
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSSecuriteInfo.com.BackDoor.AgentTeslaNET.12.6450.17799.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 188.114.96.3
                284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
                • 104.21.76.141
                IMPORT PO2024-0961 ASTG.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                • 188.114.97.3
                66b74f08ada90_shapr3D.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                • 172.67.158.159
                5zFCjSBLvw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                • 104.21.16.74
                SecuriteInfo.com.BackDoor.AgentTeslaNET.12.29781.10988.exeGet hashmaliciousSnake KeyloggerBrowse
                • 188.114.97.3
                file.exeGet hashmaliciousLummaCBrowse
                • 188.114.96.3
                FBS2024000000392.docx.docGet hashmaliciousUnknownBrowse
                • 172.67.162.208
                2fc214327d8e0c9782386edac75d16fd9c3d37ae5919f.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3b5074b1b5d032e5620f69f9f700ff0eSolaraBootstrapper.exeGet hashmaliciousUnknownBrowse
                • 104.21.21.16
                ExReporterFIX.exeGet hashmaliciousXWormBrowse
                • 104.21.21.16
                SecuriteInfo.com.BackDoor.AgentTeslaNET.12.6450.17799.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 104.21.21.16
                IMPORT PO2024-0961 ASTG.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                • 104.21.21.16
                devil.vbeGet hashmaliciousAgentTeslaBrowse
                • 104.21.21.16
                ndGmwWXGOn.htaGet hashmaliciousCobalt Strike, GuLoader, RemcosBrowse
                • 104.21.21.16
                QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 104.21.21.16
                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 104.21.21.16
                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 104.21.21.16
                No context
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
                File Type:CSV text
                Category:dropped
                Size (bytes):847
                Entropy (8bit):5.345615485833535
                Encrypted:false
                SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
                MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
                SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
                SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
                SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):6.481282082462189
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
                File size:16'344 bytes
                MD5:eb2e78bbb601facb768bd61a8e38b372
                SHA1:d51b9b3a138ae1bf345e768ee94efdced4853ff7
                SHA256:09d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf
                SHA512:5c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4
                SSDEEP:384:lwunIyqtyIEjRsVN20cunyGTVAM+o/8E9VF0NyPNjHE5V:kyyyI6sa0cgyGTVAMxkEdN7E/
                TLSH:62726D639BE85E23EC6A6E3539FB4A110279F7424D55CBA7238EC2090F233D45B523B5
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-............"...0.............R9... ...@....@.. ....................................`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x403952
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xC3A02D02 [Mon Jan 1 17:46:42 2074 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Signature Valid:false
                Signature Issuer:CN=Microsoft Edge
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 31/12/2012 23:00:00 31/12/2098 23:00:00
                Subject Chain
                • CN=Microsoft Edge
                Version:3
                Thumbprint MD5:BF77CAFFF83CFCBF82078C98A2524297
                Thumbprint SHA-1:410ED92B99C95BAC3FB8CAF70ADF6B04F9323861
                Thumbprint SHA-256:AFBB3E6566F29CB3B0D66F41652335C68AFEF5611CC7BD45E8D32FB5D6A29CB9
                Serial:AD17915FEDD6DCA74CD6C2EFD29F718E
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x38fd0x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x5f0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x24000x1bd8
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x38600x38.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x19580x1a00f658c74503e156b75cf0653e4837b3d9False0.5372596153846154data5.4079861509598794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x40000x5f00x600b4c9052cd10fb1af80a02ceb75a8b0aeFalse0.4225260416666667data4.204775520332071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x60000xc0x20016323fc6a357503a9fbd559abef74755False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x40900x360data0.4050925925925926
                RT_MANIFEST0x44000x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Aug 10, 2024 18:21:10.776884079 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:10.776940107 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:10.777025938 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:10.790714025 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:10.790735006 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.264727116 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.264801979 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.269664049 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.269678116 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.269985914 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.319658995 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.342434883 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.384510994 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866013050 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866133928 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866180897 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866197109 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.866223097 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866291046 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.866297007 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866499901 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866539955 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.866544008 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866610050 CEST44349705104.21.21.16192.168.2.5
                Aug 10, 2024 18:21:11.866770029 CEST49705443192.168.2.5104.21.21.16
                Aug 10, 2024 18:21:11.915043116 CEST49705443192.168.2.5104.21.21.16
                TimestampSource PortDest PortSource IPDest IP
                Aug 10, 2024 18:21:10.758764982 CEST5830553192.168.2.51.1.1.1
                Aug 10, 2024 18:21:10.769427061 CEST53583051.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Aug 10, 2024 18:21:10.758764982 CEST192.168.2.51.1.1.10x4e49Standard query (0)tmpfiles.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Aug 10, 2024 18:21:10.769427061 CEST1.1.1.1192.168.2.50x4e49No error (0)tmpfiles.org104.21.21.16A (IP address)IN (0x0001)false
                Aug 10, 2024 18:21:10.769427061 CEST1.1.1.1192.168.2.50x4e49No error (0)tmpfiles.org172.67.195.247A (IP address)IN (0x0001)false
                • tmpfiles.org
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549705104.21.21.164434672C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
                TimestampBytes transferredDirectionData
                2024-08-10 16:21:11 UTC87OUTGET /dl/10700323/fixclient.bin HTTP/1.1
                Host: tmpfiles.org
                Connection: Keep-Alive
                2024-08-10 16:21:11 UTC1343INHTTP/1.1 404 Not Found
                Date: Sat, 10 Aug 2024 16:21:11 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Cache-Control: no-cache, private
                CF-Cache-Status: BYPASS
                Set-Cookie: XSRF-TOKEN=eyJpdiI6ImR5YUF1RWF2NWZGMUk0WW8wdllqN2c9PSIsInZhbHVlIjoid1cyQ09CUmpKM0l6eThESG5nQU5BcG1hbmQwOXQyOFdPQXBFc0EraGhYYXp5enZ6NVI0NEpLd1ZzZjRnK0R6Z2F3bWhKM3A1ajJLTUd4Zy93UStjT1NXTjU5RWdmWUE2ZTUyZm5CN2FSRVFHOENwbjl3N2dabmJ1d1pEcW9EdWsiLCJtYWMiOiJiNzk3YjViYmZjNmY3MTg3YjM4N2YxMjM4NDFhNjQ2MjA3M2JjNGIxODJjNWM3NjVjMTU5ZDZmNmViZmFlYTY4In0%3D; expires=Sat, 10-Aug-2024 18:21:11 GMT; Max-Age=7200; path=/; samesite=lax
                Set-Cookie: tmpfiles_session=eyJpdiI6Ijl1VW1tU1c3dG90SFZ6Nll5N2g0Q1E9PSIsInZhbHVlIjoibjV6Nmd4WThKRk5KUkEweXJVQVZKRmF2MUFwcDJzU0dDcURQRDhJUkNBbjZvWllTdnFBSlo1UFVUZHlXcjRERzluRHNZRjJ6WGpUK2ZzaEpablkyWEQ4WDlLT0FEazNuOWRHN2JKZUZXNHRvNWdydjlPamRBYlBrTExtSTdwVXIiLCJtYWMiOiI4MjRiMDUzZDkzZjk3ZDhkZjVjYzgzM2EyYThlODA1NzM1MGRlNDE0Mjc0N2I3MDczNzRhMzdmM2I4YTczNWZmIn0%3D; expires=Sat, 10-Aug-2024 18:21:11 GMT; Max-Age=7200; path=/; httponly; samesite=lax
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yBESHOCB%2BbyhQr%2FkSzHteYBITO9aZqmmce0F9KhyQ876WjvB41Je%2Bkz9IRc9opDsT%2BxgXIRDbhmg2S3BKD7vlv5JPbw5kT4em%2BYgtmYrt5A%2FiFH0vpGTlkQ5GGijhxg%3D"}],"group":"cf-nel","max_age":604800}
                2024-08-10 16:21:11 UTC149INData Raw: 4e 45 4c 3a 20 7b 22 73 75 63 63 65 73 73 5f 66 72 61 63 74 69 6f 6e 22 3a 30 2c 22 72 65 70 6f 72 74 5f 74 6f 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65 22 3a 36 30 34 38 30 30 7d 0d 0a 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 43 46 2d 52 41 59 3a 20 38 62 31 31 35 31 34 61 33 66 34 38 34 33 61 39 2d 45 57 52 0d 0a 61 6c 74 2d 73 76 63 3a 20 68 33 3d 22 3a 34 34 33 22 3b 20 6d 61 3d 38 36 34 30 30 0d 0a 0d 0a
                Data Ascii: NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8b11514a3f4843a9-EWRalt-svc: h3=":443"; ma=86400
                2024-08-10 16:21:11 UTC1369INData Raw: 31 39 64 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 46 6f 6e 74 73 20 2d 2d 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74
                Data Ascii: 19d1<!DOCTYPE html><html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Not Found</title> ... Fonts --> <link rel="preconnect" href="ht
                2024-08-10 16:21:11 UTC1369INData Raw: 23 65 64 66 32 66 37 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 72 67 62 61 28 32 33 37 2c 32 34 32 2c 32 34 37 2c 76 61 72 28 2d 2d 62 6f 72 64 65 72 2d 6f 70 61 63 69 74 79 29 29 7d 2e 62 6f 72 64 65 72 2d 67 72 61 79 2d 34 30 30 7b 2d 2d 62 6f 72 64 65 72 2d 6f 70 61 63 69 74 79 3a 31 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 63 62 64 35 65 30 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 72 67 62 61 28 32 30 33 2c 32 31 33 2c 32 32 34 2c 76 61 72 28 2d 2d 62 6f 72 64 65 72 2d 6f 70 61 63 69 74 79 29 29 7d 2e 62 6f 72 64 65 72 2d 74 7b 62 6f 72 64 65 72 2d 74 6f 70 2d 77 69 64 74 68 3a 31 70 78 7d 2e 62 6f 72 64 65 72 2d 72 7b 62 6f 72 64 65 72 2d 72 69 67 68 74 2d 77 69 64 74 68 3a 31 70 78 7d 2e 66 6c 65 78 7b 64 69 73 70 6c 61 79 3a 66 6c 65 78 7d 2e
                Data Ascii: #edf2f7;border-color:rgba(237,242,247,var(--border-opacity))}.border-gray-400{--border-opacity:1;border-color:#cbd5e0;border-color:rgba(203,213,224,var(--border-opacity))}.border-t{border-top-width:1px}.border-r{border-right-width:1px}.flex{display:flex}.
                2024-08-10 16:21:11 UTC1369INData Raw: 72 61 79 2d 33 30 30 7b 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 3a 31 3b 63 6f 6c 6f 72 3a 23 65 32 65 38 66 30 3b 63 6f 6c 6f 72 3a 72 67 62 61 28 32 32 36 2c 32 33 32 2c 32 34 30 2c 76 61 72 28 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 29 29 7d 2e 74 65 78 74 2d 67 72 61 79 2d 34 30 30 7b 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 3a 31 3b 63 6f 6c 6f 72 3a 23 63 62 64 35 65 30 3b 63 6f 6c 6f 72 3a 72 67 62 61 28 32 30 33 2c 32 31 33 2c 32 32 34 2c 76 61 72 28 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 29 29 7d 2e 74 65 78 74 2d 67 72 61 79 2d 35 30 30 7b 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 3a 31 3b 63 6f 6c 6f 72 3a 23 61 30 61 65 63 30 3b 63 6f 6c 6f 72 3a 72 67 62 61 28 31 36 30 2c 31 37 34 2c 31 39 32 2c 76 61 72 28 2d 2d 74 65 78 74 2d 6f 70
                Data Ascii: ray-300{--text-opacity:1;color:#e2e8f0;color:rgba(226,232,240,var(--text-opacity))}.text-gray-400{--text-opacity:1;color:#cbd5e0;color:rgba(203,213,224,var(--text-opacity))}.text-gray-500{--text-opacity:1;color:#a0aec0;color:rgba(160,174,192,var(--text-op
                2024-08-10 16:21:11 UTC1369INData Raw: 7a 69 65 72 28 2e 38 2c 30 2c 31 2c 31 29 3b 61 6e 69 6d 61 74 69 6f 6e 2d 74 69 6d 69 6e 67 2d 66 75 6e 63 74 69 6f 6e 3a 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 38 2c 30 2c 31 2c 31 29 7d 35 30 25 7b 74 72 61 6e 73 66 6f 72 6d 3a 74 72 61 6e 73 6c 61 74 65 59 28 30 29 3b 2d 77 65 62 6b 69 74 2d 61 6e 69 6d 61 74 69 6f 6e 2d 74 69 6d 69 6e 67 2d 66 75 6e 63 74 69 6f 6e 3a 63 75 62 69 63 2d 62 65 7a 69 65 72 28 30 2c 30 2c 2e 32 2c 31 29 3b 61 6e 69 6d 61 74 69 6f 6e 2d 74 69 6d 69 6e 67 2d 66 75 6e 63 74 69 6f 6e 3a 63 75 62 69 63 2d 62 65 7a 69 65 72 28 30 2c 30 2c 2e 32 2c 31 29 7d 7d 40 6b 65 79 66 72 61 6d 65 73 20 20 62 6f 75 6e 63 65 7b 30 25 2c 74 6f 7b 74 72 61 6e 73 66 6f 72 6d 3a 74 72 61 6e 73 6c 61 74 65 59 28 2d 32 35 25 29 3b 2d 77 65 62
                Data Ascii: zier(.8,0,1,1);animation-timing-function:cubic-bezier(.8,0,1,1)}50%{transform:translateY(0);-webkit-animation-timing-function:cubic-bezier(0,0,.2,1);animation-timing-function:cubic-bezier(0,0,.2,1)}}@keyframes bounce{0%,to{transform:translateY(-25%);-web
                2024-08-10 16:21:11 UTC1141INData Raw: 28 2d 2d 62 67 2d 6f 70 61 63 69 74 79 29 29 7d 2e 64 61 72 6b 5c 3a 62 6f 72 64 65 72 2d 67 72 61 79 2d 37 30 30 7b 2d 2d 62 6f 72 64 65 72 2d 6f 70 61 63 69 74 79 3a 31 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 34 61 35 35 36 38 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 72 67 62 61 28 37 34 2c 38 35 2c 31 30 34 2c 76 61 72 28 2d 2d 62 6f 72 64 65 72 2d 6f 70 61 63 69 74 79 29 29 7d 2e 64 61 72 6b 5c 3a 74 65 78 74 2d 77 68 69 74 65 7b 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 3a 31 3b 63 6f 6c 6f 72 3a 23 66 66 66 3b 63 6f 6c 6f 72 3a 72 67 62 61 28 32 35 35 2c 32 35 35 2c 32 35 35 2c 76 61 72 28 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79 29 29 7d 2e 64 61 72 6b 5c 3a 74 65 78 74 2d 67 72 61 79 2d 34 30 30 7b 2d 2d 74 65 78 74 2d 6f 70 61 63 69 74 79
                Data Ascii: (--bg-opacity))}.dark\:border-gray-700{--border-opacity:1;border-color:#4a5568;border-color:rgba(74,85,104,var(--border-opacity))}.dark\:text-white{--text-opacity:1;color:#fff;color:rgba(255,255,255,var(--text-opacity))}.dark\:text-gray-400{--text-opacity
                2024-08-10 16:21:11 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:12:21:09
                Start date:10/08/2024
                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20001.2923.exe"
                Imagebase:0x270000
                File size:16'344 bytes
                MD5 hash:EB2E78BBB601FACB768BD61A8E38B372
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:12:21:10
                Start date:10/08/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 290de4211a47b783049621fe77aa19b69d9eaac6a0f09d92a9dc1db2629cd2b7
                  • Instruction ID: 98bd6b4c8c0d597d9f83db4a70541248ee9573e3b5da75a63d13ce091524d1d9
                  • Opcode Fuzzy Hash: 290de4211a47b783049621fe77aa19b69d9eaac6a0f09d92a9dc1db2629cd2b7
                  • Instruction Fuzzy Hash: AF31C170D01209CFDB04EFA9D4596EEBBF1FB89305F10A469D415B3261D7385A85CF58
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 708f9c12f0b974db6e54b12e57ea51e9a891a4891af4c169171efced5a7dcd3f
                  • Instruction ID: d5f77a58bcc4f6972530880fd3700e1b2df3068fb55efd6970867d618ad3a3b4
                  • Opcode Fuzzy Hash: 708f9c12f0b974db6e54b12e57ea51e9a891a4891af4c169171efced5a7dcd3f
                  • Instruction Fuzzy Hash: 06319C70D012098FDB04DFAAD9496EEBBF2FB49306F14946AD415B3291E7384A85CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0837a99ec283d729917c46914dc440321d788ee6c499c48011c0d5e47cbc37ff
                  • Instruction ID: a55388ed78b9c22b9a4fa36c47daa86edac4ef1cc1fca908f5dfe3068d3673de
                  • Opcode Fuzzy Hash: 0837a99ec283d729917c46914dc440321d788ee6c499c48011c0d5e47cbc37ff
                  • Instruction Fuzzy Hash: D931BBB5D012589FCB10CFA9D584ADEBBF4EB09320F24906AE419B7251C379AA45CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a7c9e37afa4e95fa2bfcb1984349e33c800b38f3ab4faea3fd8ba32f6718636e
                  • Instruction ID: 3f6e66f98359e8c2c581b61501123fe7c2ed12b1d6d937159183c636eab575f9
                  • Opcode Fuzzy Hash: a7c9e37afa4e95fa2bfcb1984349e33c800b38f3ab4faea3fd8ba32f6718636e
                  • Instruction Fuzzy Hash: 3B21CCB4D012589FDB10DFA9D584ADEBBF4EB09314F24906AE818B3351C378AA45CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: de5d0287f8c2fee02053cced4aa6455dce9e0e9f535ae1e92e1af0153596150a
                  • Instruction ID: 92088ceb3611c74d49aa6ca52026f54adcfac721cf5cad39ef0fe09d6efc76f1
                  • Opcode Fuzzy Hash: de5d0287f8c2fee02053cced4aa6455dce9e0e9f535ae1e92e1af0153596150a
                  • Instruction Fuzzy Hash: B5114370D052189BCB18DFA9D951ADEBBF2FF89300F24A42AE401B7391DB715D04CB69
                  Memory Dump Source
                  • Source File: 00000000.00000002.2048443473.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_8b0000_SecuriteInfo.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1e5089650423acff626aaad65825264e6e4307a96a59d2cf85eca941befb612
                  • Instruction ID: ee111ea20ece5c8578eb79b62c69f4d2e6cae83d3396f77c097a1035df123d04
                  • Opcode Fuzzy Hash: d1e5089650423acff626aaad65825264e6e4307a96a59d2cf85eca941befb612
                  • Instruction Fuzzy Hash: A8F09D78E4020CDFCB44DFA9E4909DDBBB1FF88225B10906AE418A7320DA30A846CF10