Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
Analysis ID:1538273
MD5:bd195125702c88dbb53a747d14ab74e1
SHA1:d623b02d7b75847498967d54d81c05c45a3fe929
SHA256:bf3fa6e701996cbdaf23ca371ce5591cf154390d4cdd15e3da1df608c68696eb
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe (PID: 1836 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe" MD5: BD195125702C88DBB53A747D14AB74E1)
    • conhost.exe (PID: 5496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 2040 cmdline: C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeReversingLabs: Detection: 47%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_d5a2b0ec-8
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49706 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515938410.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604914716.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515938410.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604914716.000001C513D94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.7:49706 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544
Source: classification engineClassification label: mal96.evad.winEXE@3/6@1/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1836
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5496:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ae6aec66-829c-431f-b66f-82d19f990119Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeReversingLabs: Detection: 47%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSection loaded: dpapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic file information: File size 6479360 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62d600
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeMemory written: PID: 1836 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeMemory written: PID: 1836 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeMemory written: PID: 1836 base: 7FFB2D04000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeMemory written: PID: 1836 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515798335.000001C513E04000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513E04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXET&}
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605218443.00007FF732231000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FILEMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSCONFIGAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERCONFIGSAVE CONFIGCONFIG.JSONLOAD CONFIGCONFIG OPTIONLEGIT CONFIGRAGE CONFIGMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeRDTSC instruction interceptor: First address: 7FF732CFE341 second address: 7FF732C5A00F instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 pop ecx 0x00000005 inc cx 0x00000007 not edx 0x00000009 inc esp 0x0000000a cmovnb edi, esi 0x0000000d pop edx 0x0000000e inc sp 0x00000010 movzx edi, bh 0x00000013 inc eax 0x00000014 not bh 0x00000016 xchg ax, bx 0x00000018 inc ecx 0x00000019 pop esp 0x0000001a dec eax 0x0000001b cwde 0x0000001c cbw 0x0000001e inc ecx 0x0000001f pop eax 0x00000020 pop eax 0x00000021 dec ecx 0x00000022 movzx edi, ax 0x00000025 dec ecx 0x00000026 xchg edx, edi 0x00000028 dec ebp 0x00000029 movsx edi, di 0x0000002c pop ebx 0x0000002d inc eax 0x0000002e mov bh, A3h 0x00000030 inc ecx 0x00000031 pop edx 0x00000032 inc ecx 0x00000033 movzx edi, si 0x00000036 bswap edi 0x00000038 pop edi 0x00000039 inc ecx 0x0000003a pop edi 0x0000003b jmp 00007F8BF0F252A9h 0x00000040 ret 0x00000041 popfd 0x00000042 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeRDTSC instruction interceptor: First address: 7FF73268D38E second address: 7FF7326732BB instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 jmp 00007F8BF07D8E4Ch 0x00000009 pop ebp 0x0000000a cdq 0x0000000b cbw 0x0000000d inc sp 0x0000000f movzx eax, al 0x00000012 pop edi 0x00000013 inc sp 0x00000015 mov esi, ebp 0x00000017 lahf 0x00000018 inc ecx 0x00000019 pop eax 0x0000001a inc bp 0x0000001c cmovne ebp, ebp 0x0000001f dec eax 0x00000020 cwde 0x00000021 pop ebx 0x00000022 inc esp 0x00000023 movzx esi, bp 0x00000026 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeRDTSC instruction interceptor: First address: 7FF7326C5BFC second address: 7FF7326C5C0B instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edx 0x00000004 shl ax, 0064h 0x00000008 inc ecx 0x00000009 sub ebp, 613D3C4Eh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSpecial instruction interceptor: First address: 7FF732C5A00F instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSpecial instruction interceptor: First address: 7FF732C5A027 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604981559.000001C513DD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604981559.000001C513DD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWAprMayJunJulAugSepOctNov
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp}
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeNtProtectVirtualMemory: Indirect: 0x7FF73277BEE5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D70000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe47%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpfalse
        unknown
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1516012902.000001C513DD3000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000003.1515938410.000001C513D94000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604914716.000001C513D94000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpfalse
              unknown
              https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605335437.00007FF732357000.00000002.00000001.01000000.00000003.sdmpfalse
              • URL Reputation: safe
              unknown
              https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1604807252.000001C513D4C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://rsms.me/ThisSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe, 00000000.00000002.1605381086.00007FF7323A3000.00000004.00000001.01000000.00000003.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.26.1.5
                    keyauth.winUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1538273
                    Start date and time:2024-10-20 23:23:23 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 30s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                    Detection:MAL
                    Classification:mal96.evad.winEXE@3/6@1/1
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.168.117.173
                    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                    TimeTypeDescription
                    17:24:45API Interceptor1x Sleep call for process: SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe modified
                    17:24:54API Interceptor1x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.26.1.5lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                      oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                          Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                              4.7.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.25703.16605.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.MalwareX-gen.5842.23757.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winSecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSd600758023374f78d58acafbcaf94af66ad203b28e22a.exeGet hashmaliciousQuasarBrowse
                                        • 172.67.74.152
                                        SecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 188.114.96.3
                                        lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        WinFIG.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        SentinelOculus.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        Download.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):1.0462714096789532
                                        Encrypted:false
                                        SSDEEP:96:j0FUiJxe7cRscThqsGhiXSKQXIDcQwc6xlTcEfcw3OkPk9+HbHg/8BRTf3o8Fa9I:IjRREx0OVp1/jokJNzuiF/Z24lO8F90
                                        MD5:1715D210792EC882D29B866AF0127819
                                        SHA1:CBCEA2ECADD3E5F1E69EBC9793726F95A29DE5A2
                                        SHA-256:B6F73495B6AD34F084569D969B590865BB5DA9F84950D52A75CA9D3E98322229
                                        SHA-512:4C8B072111BE27397FA82D4EFF362BB70FC23AEAE2843D032CB505A7659FD1FAE1DDFFA196308824A10CD2E21AD6FB8BBF38F500068CA82C2F8527B3949858F7
                                        Malicious:false
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.3.0.8.5.7.3.2.5.5.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.3.0.8.6.2.6.3.7.9.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.0.5.8.d.a.0.5.-.8.b.9.4.-.4.1.5.9.-.b.8.b.7.-.1.b.a.7.9.e.2.a.0.5.4.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.3.3.0.f.2.9.-.4.0.7.5.-.4.6.d.d.-.8.3.f.9.-.b.1.9.1.8.0.8.9.a.2.3.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...2.5.0.1.0...2.4.0.3.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.2.c.-.0.0.0.1.-.0.0.1.4.-.e.0.c.9.-.3.2.7.a.3.6.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.6.a.5.1.5.f.2.f.5.7.7.3.2.9.c.9.8.6.f.9.2.8.c.e.3.e.7.d.a.3.5.0.0.0.0.f.f.f.f.!.0.0.0.0.d.6.2.3.b.0.2.d.7.b.7.5.8.4.7.4.9.8.9.6.7.d.5.4.d.8.1.c.0.5.c.4.5.a.3.f.e.9.2.9.!.S.e.c.u.r.i.t.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:24:46 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):245322
                                        Entropy (8bit):1.2869574733355431
                                        Encrypted:false
                                        SSDEEP:768:USuKLF2PBGpq7KqDK9LaG3dt9Rn9ODTCN3U56LS:Pl2yoCN3U5qS
                                        MD5:B755D416A267887B5B55515D60BF4AF7
                                        SHA1:27321528023EDD300678712126CEA9E2368FA6A8
                                        SHA-256:7FA023684549967CA3EA43001D8F352D87A2CDA174D890573FA9F87227D15191
                                        SHA-512:BF8B02B05EB894CE57F79FFDC6FFA5900F9E8D1014B1B7B7DE9A306EFDDE4DC19EB00B19F4257E85BD3D1FB380C70450A3B2C6F92C9E95E8187ADB818750D14E
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ........u.g............4...............H.......$...X"......D...............`.......8...........T............;..............|"..........h$..............................................................................eJ.......%......Lw......................T.......,....u.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8968
                                        Entropy (8bit):3.701081442920724
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJw716YNYx/VgmfAJFIcpD089bqHkfWum:R6lXJk16Yix/VgmfAbIQqEfW
                                        MD5:88C67F25A2F02C4C1C833D140A7E2FE7
                                        SHA1:7EFD9798CF206D3D10277AFA982B48C2420EB7BA
                                        SHA-256:58B249AD473284726CDEEF4CFF3820EE1B1A9A6A770E7BA89BCFE6ED0A070017
                                        SHA-512:95182D1AA41669F94351C9A5F42581AC620F29A08F441E443B0433D4DB53FBA9C5A5D5158A147224CC7D628C989746F9DE65DA60D531A35D1337B454E786A6E3
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.3.6.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4951
                                        Entropy (8bit):4.527775023149325
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zsjJg771I9tCWpW8VYEYm8M4J5mjJsFZgyq8v2jJnJWJVD2qGKGXd:uIjf9I7yD7VQJ/gW8JWHCPXd
                                        MD5:CDF952930CA910D381FD28B4647767FF
                                        SHA1:A54146102E69D32D66F0CBB258ED04546A7BA3BE
                                        SHA-256:D1229603997F662453CEF41343B325CDEF0165DD5BE492136FC8D131FFBA2BAB
                                        SHA-512:095DCC178F061F500B11D0BCB143FD10901799C6A7369DE85B7593A85C3C34068B80B73CCE9D8D9C31AF4E1F5BFB881598275146364344DEEC783C3547E89BF4
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552267" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.417036749510784
                                        Encrypted:false
                                        SSDEEP:6144:Zcifpi6ceLPL9skLmb0m4SWSPtaJG8nAgex285i2MMhA20X4WABlGuNT5+:Gi584SWIZBk2MM6AFBZo
                                        MD5:DE255F13F38420AFEE8B5B8EB02282CD
                                        SHA1:A6F5009CDE6FBD49D549100120F73E55844AA03B
                                        SHA-256:E2BC96A4D8F7A4DFAE45D5E411BA2E7BC10BBE9B77906BB1AC7B77A4A7D5347B
                                        SHA-512:4D06B5AE809BEB3BC9B05DB18FB9AB41827B6E72030688AC8077FABE40AA4B8997615A2B0E351C052F8B4F77206695312DAE83C27ED3113EED1F90BF27A7EBEF
                                        Malicious:false
                                        Reputation:low
                                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&.&|6#...............................................................................................................................................................................................................................................................................................................................................C1H........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):208
                                        Entropy (8bit):2.1484250760035604
                                        Encrypted:false
                                        SSDEEP:3:rRRqmVt//lDqa+I4AuGLXmuLx:HVt/dlVuGLWm
                                        MD5:E0C9AA53E4E6B55C514005AB4B116736
                                        SHA1:F9B0F7516B304FFA0A67B56AE38C80D4957E66A2
                                        SHA-256:7165C43853EBE4191983511C52F823DB5C93CE445837626F3CB44D0E5D800A6A
                                        SHA-512:4FE06A4153610B24ECBA7CC6BF3F2A75FB4E259C66DEBB98358CC9ADAE4247D4DAE2BCB30A100BDF7F6758BC130A04F391A5434A673A4D5A6ACFCB20BB5FA4CD
                                        Malicious:false
                                        Reputation:low
                                        Preview:....##########################################################..[ ERROR: ]..##########################################################....[-] Open Your Game...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):7.923518633376135
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                                        File size:6'479'360 bytes
                                        MD5:bd195125702c88dbb53a747d14ab74e1
                                        SHA1:d623b02d7b75847498967d54d81c05c45a3fe929
                                        SHA256:bf3fa6e701996cbdaf23ca371ce5591cf154390d4cdd15e3da1df608c68696eb
                                        SHA512:966f321a0f00bae856d1dfee0dee769e22ba77a6315e24f48d579924c594294a87196c8327ebe5fc5f09a20b0f2872365f1bc120ac174bfbf913ac89f1d21a66
                                        SSDEEP:196608:txGZbr6/asuIUI7bB1xnHVe1iEq2YDcNzLblUwMLd4hP2:tIx6Ss0InNwbwWh+d+P2
                                        TLSH:1D6623EE6144371CC45AC0749633AD09F2B5562E5EF6E8BA32CB3BA077EF425D642B04
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Kf.f.........."....&.T............l........@..........................................`................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x1406cf2d0
                                        Entrypoint Section:.vmp1
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66FC664B [Tue Oct 1 21:14:51 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:2327f58e2564a30d7182461fe55de246
                                        Instruction
                                        push 184DB146h
                                        call 00007F8BF0922D69h
                                        mov ebp, 5C7CF9B2h
                                        sub ebx, dword ptr [ecx+69706100h]
                                        sub eax, 772D736Dh
                                        imul ebp, dword ptr [esi+2Dh], 2D747263h
                                        jne 00007F8BF0519E36h
                                        imul ebp, dword ptr [ecx+ebp*2+74h], 316C2D79h
                                        sub eax, 2E302D31h
                                        insb
                                        insb
                                        add dh, dl
                                        add eax, 192A867Ah
                                        int 08h
                                        stosb
                                        mov edx, 6B5EF891h
                                        mov dword ptr [A3F06AA0h], eax
                                        stosb
                                        adc dword ptr [edx-0F5D0BC2h], ecx
                                        mov word ptr [edx+61h], ss
                                        les ecx, edi
                                        sbb al, al
                                        out dx, al
                                        test al, 43h
                                        sbb eax, A0DB6ACFh
                                        mov al, byte ptr [CC465198h]
                                        retf 4C8Ch
                                        push es
                                        in eax, B8h
                                        mov esp, 8677F54Ch
                                        retf
                                        sar byte ptr [edi+ecx*4+61h], cl
                                        rsm
                                        dec esp
                                        push edi
                                        push esp
                                        pop ecx
                                        imul edx, ebp, 0Eh
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x5f15300xc4f.vmp1
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x9d94c00x2bc.vmp1
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb870000x1e0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb756600xfe64.vmp1
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb860000xd4.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0xa0c9500x30.vmp1
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb755200x140.vmp1
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x6950000x280.vmp1
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x1252300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x1270000x4b2340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x1730000x56bd80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x1ca0000xd1040x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .vmp00x1d80000x37ff650x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .vmp10x5580000x62d4c40x62d600acbcd3d6d11fd59111b1845c779268f1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .reloc0xb860000xd40x200fbd08f93d3bbf21cfa038d544aa66c06False0.33984375GLS_BINARY_LSB_FIRST1.9840535960508112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0xb870000x1e00x2005a17fbb87dbacc17bb1c5118ed518fe9False0.537109375data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0xb870580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        d3d11.dllD3D11CreateDeviceAndSwapChain
                                        D3DCOMPILER_47.dllD3DCompile
                                        KERNEL32.dllReadFile
                                        USER32.dllSetCursor
                                        ADVAPI32.dllControlService
                                        MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
                                        dwmapi.dllDwmExtendFrameIntoClientArea
                                        WINHTTP.dllWinHttpSendRequest
                                        CRYPT32.dllCertFreeCertificateChainEngine
                                        IMM32.dllImmReleaseContext
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        WS2_32.dllsendto
                                        RPCRT4.dllRpcStringFreeA
                                        PSAPI.DLLGetModuleInformation
                                        USERENV.dllUnloadUserProfile
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        VCRUNTIME140.dll__current_exception_context
                                        api-ms-win-crt-runtime-l1-1-0.dll_beginthreadex
                                        api-ms-win-crt-stdio-l1-1-0.dllfputc
                                        api-ms-win-crt-heap-l1-1-0.dllrealloc
                                        api-ms-win-crt-math-l1-1-0.dllatanf
                                        api-ms-win-crt-string-l1-1-0.dllstrncpy
                                        api-ms-win-crt-time-l1-1-0.dll_time64
                                        api-ms-win-crt-convert-l1-1-0.dllatof
                                        api-ms-win-crt-utility-l1-1-0.dllqsort
                                        api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                        SHELL32.dllShellExecuteA
                                        WTSAPI32.dllWTSSendMessageW
                                        KERNEL32.dllGetSystemTimeAsFileTime
                                        USER32.dllGetUserObjectInformationW
                                        KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                        USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:24:44.924154997 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:44.924189091 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:44.924341917 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:44.927074909 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:44.927088976 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:45.692049026 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:45.692132950 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:45.705322981 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:45.705355883 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:45.705642939 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:45.755948067 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.296330929 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.339409113 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658531904 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658585072 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658616066 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658663034 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658673048 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.658694029 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658705950 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.658732891 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658770084 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658780098 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.658785105 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.658823967 CEST49706443192.168.2.7104.26.1.5
                                        Oct 20, 2024 23:24:46.658828974 CEST44349706104.26.1.5192.168.2.7
                                        Oct 20, 2024 23:24:46.662455082 CEST49706443192.168.2.7104.26.1.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:24:44.908979893 CEST5229953192.168.2.71.1.1.1
                                        Oct 20, 2024 23:24:44.916816950 CEST53522991.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:24:44.908979893 CEST192.168.2.71.1.1.10x1d26Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:24:44.916816950 CEST1.1.1.1192.168.2.70x1d26No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:24:44.916816950 CEST1.1.1.1192.168.2.70x1d26No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:24:44.916816950 CEST1.1.1.1192.168.2.70x1d26No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749706104.26.1.54431836C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-20 21:24:46 UTC95OUTGET / HTTP/1.1
                                        Connection: Keep-Alive
                                        User-Agent: CPlusPlusExample/1.0
                                        Host: keyauth.win
                                        2024-10-20 21:24:46 UTC1135INHTTP/1.1 200 OK
                                        Date: Sun, 20 Oct 2024 21:24:46 GMT
                                        Content-Type: text/html
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Last-Modified: Fri, 18 Oct 2024 19:31:24 GMT
                                        Cache-Control: max-age=14400
                                        CF-Cache-Status: HIT
                                        Age: 6907
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ypz2B4YgRkYWjqOZoFDNawKjoiM%2FtqcOSm84fHdyViSgyl5AjV9dPHFKZ%2FNkwym0W%2F0riOzCgntfJrW0N%2B8deuneCgOqMfj%2FJX9PrMQjD1ZsVxv2RSM5l6gmF%2FI%2B"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Acknowledge: Credit to VaultCord.com
                                        X-Powered-By: VaultCord.com
                                        content-security-policy: upgrade-insecure-requests
                                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                        referrer-policy: strict-origin-when-cross-origin
                                        strict-transport-security: max-age=31536000; includeSubDomains
                                        x-content-security-policy: img-src *; media-src * data:;
                                        x-content-type-options: nosniff
                                        x-frame-options: DENY
                                        x-xss-protection: 1; mode=block
                                        Server: cloudflare
                                        CF-RAY: 8d5c139dd82a1018-LAX
                                        2024-10-20 21:24:46 UTC234INData Raw: 37 62 32 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65
                                        Data Ascii: 7b2f<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="Ke
                                        2024-10-20 21:24:46 UTC1369INData Raw: 79 41 75 74 68 20 2d 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d
                                        Data Ascii: yAuth - Open Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name=
                                        2024-10-20 21:24:46 UTC1369INData Raw: 65 74 69 74 6f 72 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a
                                        Data Ascii: etitors"> <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:
                                        2024-10-20 21:24:46 UTC1369INData Raw: 74 74 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65
                                        Data Ascii: tton" content="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" conte
                                        2024-10-20 21:24:46 UTC1369INData Raw: 2d 32 20 68 6f 76 65 72 3a 6f 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72
                                        Data Ascii: -2 hover:opacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium r
                                        2024-10-20 21:24:46 UTC1369INData Raw: 20 20 20 20 20 20 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c
                                        Data Ascii: xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l
                                        2024-10-20 21:24:46 UTC1369INData Raw: 30 22 3e 46 65 61 74 75 72 65 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64
                                        Data Ascii: 0">Features</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-med
                                        2024-10-20 21:24:46 UTC1369INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                        Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]">


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:24:42
                                        Start date:20/10/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exe"
                                        Imagebase:0x7ff732230000
                                        File size:6'479'360 bytes
                                        MD5 hash:BD195125702C88DBB53A747D14AB74E1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:17:24:42
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff75da10000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:17:24:45
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 1836 -s 1544
                                        Imagebase:0x7ff6bd090000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        No disassembly