Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
Analysis ID:1538277
MD5:56e03b7a884e43071eda33e14c114efb
SHA1:6b4dabc352fedff4cf71628e0a3a14b9e05f9424
SHA256:4fbb8815e8229acd72feb2aba3bb6331de0a696b18c312e10dee0465ed59bb69
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe (PID: 4292 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe" MD5: 56E03B7A884E43071EDA33E14C114EFB)
    • conhost.exe (PID: 3520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 520 cmdline: C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_e9941f66-a
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49709 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547951252.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433464121.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/4
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/R
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/ll
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433464121.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.11:49709 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576
Source: classification engineClassification label: mal96.evad.winEXE@3/6@1/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4292
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3520:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f3dd8e32-7d5a-4ceb-9374-c9ab159fc585Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSection loaded: dpapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic file information: File size 6498304 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x632000
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeMemory written: PID: 4292 base: 7FFEFE690008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeMemory written: PID: 4292 base: 7FFEFE52D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeMemory written: PID: 4292 base: 7FFEFE6A000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeMemory written: PID: 4292 base: 7FFEFE55CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXEZQ
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548430564.00007FF7482C1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FILEMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERCORNER2D3DBACKSPACETABENTERPAUSEESCAPESPACEENDHOMEINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIVISUALSMISCCOLORSCONFIGVISUALSVISUALS OTHERSBOX TYPEMISCMISC SETTINGSCOLOR PICKERCONFIGSAVE CONFIGCONFIG.JSONLOAD CONFIGLOBIJETTASTRARIFT_TARGETINGFORM_PC_CKAY/OBREACHBRIMSTONECHAMBERCYPHERKAY/OKILLJOYNEONOMENPHOENIXRAZEREYNASAGESKYESOVAVIPERYORUFADEBOTGEKKOHARBORDEADLOCKVYSEMEDALOVERLAYMEDALOVERLAYCLASS [ %.FM ] HEALTH RENDERED][ CR][V4L0R4NT ESP]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeRDTSC instruction interceptor: First address: 7FF7487B2462 second address: 7FF7487B2476 instructions: 0x00000000 rdtsc 0x00000002 cwd 0x00000004 pop ebx 0x00000005 inc ecx 0x00000006 not bl 0x00000008 inc ecx 0x00000009 pop esp 0x0000000a inc cx 0x0000000c bswap ebx 0x0000000e inc ecx 0x0000000f pop ecx 0x00000010 pop ebp 0x00000011 dec esp 0x00000012 arpl cx, dx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeRDTSC instruction interceptor: First address: 7FF748E206D2 second address: 7FF748E206DD instructions: 0x00000000 rdtsc 0x00000002 popfd 0x00000003 inc esp 0x00000004 movzx ebx, sp 0x00000007 dec eax 0x00000008 cwde 0x00000009 inc ecx 0x0000000a pop edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSpecial instruction interceptor: First address: 7FF748CF9A65 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSpecial instruction interceptor: First address: 7FF748CF9A7D instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWr
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433526838.00000164F0E14000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeNtProtectVirtualMemory: Indirect: 0x7FF748818838Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433244877.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E2E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0DAF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe42%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
172.67.72.57
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpfalse
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548027757.00000164F0E14000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000003.1433464121.00000164F0DD4000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpfalse
              unknown
              https://rsms.me/ThisSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpfalse
                unknown
                http://upx.sf.netAmcache.hve.5.drfalse
                • URL Reputation: safe
                unknown
                https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548521405.00007FF7483F1000.00000002.00000001.01000000.00000003.sdmpfalse
                • URL Reputation: safe
                unknown
                https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1548561977.00007FF74843D000.00000004.00000001.01000000.00000003.sdmpfalse
                    unknown
                    https://keyauth.win/4SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://keyauth.win/RSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://keyauth.win/api/1.2/llSecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe, 00000000.00000002.1547838130.00000164F0D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.67.72.57
                          keyauth.winUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1538277
                          Start date and time:2024-10-20 23:23:36 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 5m 36s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:11
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                          Detection:MAL
                          Classification:mal96.evad.winEXE@3/6@1/1
                          EGA Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.21
                          • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                          TimeTypeDescription
                          17:24:52API Interceptor1x Sleep call for process: SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe modified
                          17:25:03API Interceptor1x Sleep call for process: WerFault.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          172.67.72.57lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                            flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                              Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                    fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              keyauth.winSecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                              • 172.67.72.57
                                              J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.1.5
                                              J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                              • 172.67.72.57
                                              bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSd600758023374f78d58acafbcaf94af66ad203b28e22a.exeGet hashmaliciousQuasarBrowse
                                              • 172.67.74.152
                                              SecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.53.8
                                              w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              • 188.114.96.3
                                              lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                              • 172.67.72.57
                                              J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.1.5
                                              J1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.0.5
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              WinFIG.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              SentinelOculus.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              Download.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.72.57
                                              No context
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.0435503174314924
                                              Encrypted:false
                                              SSDEEP:192:gErpW7rVOG0OVpjBjokJNzuiF/Z24lO8fY:yrVOtOVpjBjlzuiF/Y4lO8f
                                              MD5:1E7B9BE6E824B03D853987E711F24385
                                              SHA1:1F95DDE9BAF7A7CEC3C6FD5F0136011DA8D6F70A
                                              SHA-256:F8D2C348CBA48489231944C389BA45E822462BEC61844610BA2E032618BEEC3A
                                              SHA-512:3B292E3AD524C4C660DC1292911F5ABD9534E5889CDDE9369AEFF1515EA5C25D239EA9F17C3195CACC1C4A0F47C8AE2A6A5A1B99494B8F1CA4690F63DE55EC86
                                              Malicious:false
                                              Reputation:low
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.3.0.9.3.1.4.1.6.2.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.3.0.9.3.5.9.4.7.3.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.c.1.1.e.2.9.-.3.6.f.d.-.4.3.c.e.-.a.5.a.f.-.3.2.9.6.0.6.4.1.8.7.6.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.6.e.9.4.c.2.-.d.5.0.a.-.4.0.4.e.-.9.1.a.0.-.d.2.9.7.c.7.f.9.4.a.a.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...1.0.1.5.9...8.1.4.3...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.c.4.-.0.0.0.1.-.0.0.1.3.-.b.0.c.f.-.8.8.7.e.3.6.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.7.5.3.5.7.9.a.1.3.b.9.a.0.6.6.7.8.4.4.a.a.e.0.c.3.7.1.a.2.5.0.0.0.0.f.f.f.f.!.0.0.0.0.6.b.4.d.a.b.c.3.5.2.f.e.d.f.f.4.c.f.7.1.6.2.8.e.0.a.3.a.1.4.b.9.e.0.5.f.9.4.2.4.!.S.e.c.u.r.i.t.e.
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:24:53 2024, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):246070
                                              Entropy (8bit):1.3075698664253133
                                              Encrypted:false
                                              SSDEEP:384:gDpvRQCYLsF2PBvoDHcKGx/o3e/ON0dBmXwaP4gFsbMgqo08:KvRNBF2PBvoA/ou/+CB8w/dbOo08
                                              MD5:FD64709AF80459A97D9A3EFDAF96AB82
                                              SHA1:1A9E41EFDC7E34FCBA5BC9F8D8162DF16CA15C69
                                              SHA-256:E0AD65ADB6633F3E2CBFA6C0869D34073AD0A772FED94053DFC3662A80A19AED
                                              SHA-512:E3956AEB26D9D11348A42E06AC3C92B820A0CD0221221EEB52C6A82CC58AD0A2536720EB9B3BEAADA830BC376490D13935CC008C33F86BF295C9633A261CC504
                                              Malicious:false
                                              Reputation:low
                                              Preview:MDMP..a..... .......%u.g............4...............H.......$...X"......................`.......8...........T............<..............|"..........h$..............................................................................eJ.......%......Lw......................T...........!u.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8964
                                              Entropy (8bit):3.6978175322991444
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJP2Iw6YewY5jGgmfjJFIqpDP89b2K0f/ym:R6lXJeN6YJYcgmfjbIX2BfL
                                              MD5:53F9DF9552E19364ED1793C32AA71F7F
                                              SHA1:B129C4A10AE6F2C9FD7A86813DABE3A230F1B41D
                                              SHA-256:D82819AEC96ADC42A02687919E1BD6327CE00679B7879A80D328E0A253AB6163
                                              SHA-512:3DF200119271DD784CDEB45CB59FCCED437E92B887E0383296DAF66986855E3FAC4CCE22FED8F80B0C27E36D29F3624C917FDCE36B4B410ED15DE39F6DF38B80
                                              Malicious:false
                                              Reputation:low
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.9.2.<./.P.i.
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4946
                                              Entropy (8bit):4.519248963457886
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zsjJg771I9QbWpW8VYwYm8M4J5KyNJsFkyq8v2yNJTz38YKjKLd:uIjf9I7vq7V4JnWDwuLd
                                              MD5:9A2C6C2949204118E654A5EFD8375058
                                              SHA1:462CDFEED0AC2172CB336BEA4D7898A634CCE94C
                                              SHA-256:46553BCCFDCCC7816BFA07F87DE052C65E2CBB3CFBF0C40054382403EC060D3D
                                              SHA-512:69E6793A92F059E08452B4D5F9A4DDA797E23BA85195D7434FFA8DE9CA218F53DB3379CD04EF839BE1BDD4BA48354B40309BA1998732453246E6426C79E18543
                                              Malicious:false
                                              Reputation:low
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552267" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1835008
                                              Entropy (8bit):4.298787087915844
                                              Encrypted:false
                                              SSDEEP:6144:PECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lTSD6VJSRLo:sCsL6seqD5SuSWVARs
                                              MD5:0DB42E4E8473D67C9D4ADBA99ADFD4E5
                                              SHA1:24B5CDA4C01473C38716534B148A196248627207
                                              SHA-256:F51FF57DAAB1653A04973E584214FE8159D04CB5CE5820FCC1CEE15A37D4CE91
                                              SHA-512:4CE88A4602BA183D2953C847AC5C9A42379A5B94FA610323D7F0E71147E6A03FDB7095C37C3068B7853F73CB7169A08627E3AC554870ACC353C776C261B33144
                                              Malicious:false
                                              Reputation:low
                                              Preview:regfD...D....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm^.6#.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):208
                                              Entropy (8bit):2.1484250760035604
                                              Encrypted:false
                                              SSDEEP:3:rRRqmVt//lDqa+I4AuGLXmuLx:HVt/dlVuGLWm
                                              MD5:E0C9AA53E4E6B55C514005AB4B116736
                                              SHA1:F9B0F7516B304FFA0A67B56AE38C80D4957E66A2
                                              SHA-256:7165C43853EBE4191983511C52F823DB5C93CE445837626F3CB44D0E5D800A6A
                                              SHA-512:4FE06A4153610B24ECBA7CC6BF3F2A75FB4E259C66DEBB98358CC9ADAE4247D4DAE2BCB30A100BDF7F6758BC130A04F391A5434A673A4D5A6ACFCB20BB5FA4CD
                                              Malicious:false
                                              Reputation:low
                                              Preview:....##########################################################..[ ERROR: ]..##########################################################....[-] Open Your Game...
                                              File type:PE32+ executable (console) x86-64, for MS Windows
                                              Entropy (8bit):7.922193933626134
                                              TrID:
                                              • Win64 Executable Console (202006/5) 92.65%
                                              • Win64 Executable (generic) (12005/4) 5.51%
                                              • Generic Win/DOS Executable (2004/3) 0.92%
                                              • DOS Executable Generic (2002/1) 0.92%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                                              File size:6'498'304 bytes
                                              MD5:56e03b7a884e43071eda33e14c114efb
                                              SHA1:6b4dabc352fedff4cf71628e0a3a14b9e05f9424
                                              SHA256:4fbb8815e8229acd72feb2aba3bb6331de0a696b18c312e10dee0465ed59bb69
                                              SHA512:dbb40e27496a5486a31ee877503569a2d151456e9b3d34156acaf090ffca1032ec3e8f93481bee12c910dbafa15946caab0bc6d1b737345f153cab2cdec752f3
                                              SSDEEP:196608:QaJOqG2BV+B267JA3bBKRZZJYdeuxhQr:Q1nDBUgZZudA
                                              TLSH:CA6622F971983718C41ACC345423F949B2F6251F0EE889AAB9DFFAC06F8B514E652F05
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....g.f.........."....&.......................@..........................................`................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x140a1e492
                                              Entrypoint Section:.vmp1
                                              Digitally signed:false
                                              Imagebase:0x140000000
                                              Subsystem:windows cui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x66FC67A1 [Tue Oct 1 21:20:33 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:4f4519958458f4ad89624a1e1b72dbd1
                                              Instruction
                                              push F2EA25ECh
                                              call 00007FADB524679Ah
                                              inc edi
                                              retn EF3Eh
                                              inc ebp
                                              sbb byte ptr [edi], ah
                                              cmp eax, 3C2AC9EFh
                                              int1
                                              adc byte ptr [eax-10F7E8A8h], dl
                                              stc
                                              cld
                                              jns 00007FADB51051C6h
                                              out dx, eax
                                              mov cl, FFFFFFA9h
                                              sub eax, 0F50A0EFh
                                              rcl byte ptr [eax], 1
                                              jc 00007FADB510515Bh
                                              out dx, eax
                                              dec eax
                                              insd
                                              add ebx, dword ptr [esi-11h]
                                              out FBh, eax
                                              lea ebp, dword ptr [eax+52DFA210h]
                                              jmp 00007FADB5105192h
                                              in eax, dx
                                              add eax, 64EF3C09h
                                              jmp far C738h : 18EF32DCh
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x666b380xc4f.vmp1
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x6542a80x2bc.vmp1
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb980000x1e0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb870200xff9c.vmp1
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb970000xdc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0xa34d300x30.vmp1
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb86ee00x140.vmp1
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0xa330000x280.vmp1
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x12f7a00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x1310000x4b8ae0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x17d0000x567f00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .pdata0x1d40000xd23c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .vmp00x1e20000x382aba0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .vmp10x5650000x631fbc0x632000085ec521bd23ec81fdf096524346dd6aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .reloc0xb970000xdc0x2004e39761b6ecf6ed17ac89607d51e1fc0False0.3515625GLS_BINARY_LSB_FIRST2.1031791657531316IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .rsrc0xb980000x1e00x200f691935ac091c1fe70ac7f7dd12ca6d5False0.537109375data4.766656762050388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_MANIFEST0xb980580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                              DLLImport
                                              d3d11.dllD3D11CreateDeviceAndSwapChain
                                              D3DCOMPILER_47.dllD3DCompile
                                              KERNEL32.dllReadFile
                                              USER32.dllSetCursorPos
                                              ADVAPI32.dllControlService
                                              MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
                                              dwmapi.dllDwmExtendFrameIntoClientArea
                                              WINHTTP.dllWinHttpSendRequest
                                              CRYPT32.dllCertFreeCertificateChainEngine
                                              IMM32.dllImmReleaseContext
                                              Normaliz.dllIdnToAscii
                                              WLDAP32.dll
                                              WS2_32.dllrecvfrom
                                              RPCRT4.dllRpcStringFreeA
                                              PSAPI.DLLGetModuleInformation
                                              USERENV.dllUnloadUserProfile
                                              VCRUNTIME140_1.dll__CxxFrameHandler4
                                              VCRUNTIME140.dll__current_exception_context
                                              api-ms-win-crt-runtime-l1-1-0.dll_beginthreadex
                                              api-ms-win-crt-stdio-l1-1-0.dllfputc
                                              api-ms-win-crt-heap-l1-1-0.dll_callnewh
                                              api-ms-win-crt-math-l1-1-0.dllcos
                                              api-ms-win-crt-string-l1-1-0.dllstrncpy
                                              api-ms-win-crt-time-l1-1-0.dll_time64
                                              api-ms-win-crt-convert-l1-1-0.dllatoi
                                              api-ms-win-crt-utility-l1-1-0.dllqsort
                                              api-ms-win-crt-filesystem-l1-1-0.dll_lock_file
                                              api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                              SHELL32.dllShellExecuteA
                                              WTSAPI32.dllWTSSendMessageW
                                              KERNEL32.dllGetSystemTimeAsFileTime
                                              USER32.dllGetUserObjectInformationW
                                              KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                              USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 20, 2024 23:24:52.862659931 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:52.862701893 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:52.862771988 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:52.865766048 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:52.865777969 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.543476105 CEST49709443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.543534994 CEST44349709172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.543598890 CEST49709443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.543889999 CEST49709443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.543906927 CEST44349709172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.640655994 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.640758038 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.668252945 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.668272972 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.668550014 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.710618973 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.734191895 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.779402971 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913008928 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913053036 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913088083 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913116932 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913151979 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913156033 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.913166046 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913182974 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.913203001 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.913207054 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913716078 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913746119 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913849115 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.913853884 CEST44349708172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:53.913997889 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:53.916539907 CEST49708443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:24:54.314146996 CEST44349709172.67.72.57192.168.2.11
                                              Oct 20, 2024 23:24:54.314268112 CEST49709443192.168.2.11172.67.72.57
                                              Oct 20, 2024 23:25:05.536032915 CEST49709443192.168.2.11172.67.72.57
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 20, 2024 23:24:52.845417023 CEST6545953192.168.2.111.1.1.1
                                              Oct 20, 2024 23:24:52.853307009 CEST53654591.1.1.1192.168.2.11
                                              Oct 20, 2024 23:25:20.077092886 CEST53506651.1.1.1192.168.2.11
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 20, 2024 23:24:52.845417023 CEST192.168.2.111.1.1.10x25e9Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 20, 2024 23:24:52.853307009 CEST1.1.1.1192.168.2.110x25e9No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                              Oct 20, 2024 23:24:52.853307009 CEST1.1.1.1192.168.2.110x25e9No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                              Oct 20, 2024 23:24:52.853307009 CEST1.1.1.1192.168.2.110x25e9No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                              • keyauth.win
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.1149708172.67.72.574434292C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-20 21:24:53 UTC95OUTGET / HTTP/1.1
                                              Connection: Keep-Alive
                                              User-Agent: CPlusPlusExample/1.0
                                              Host: keyauth.win
                                              2024-10-20 21:24:53 UTC1123INHTTP/1.1 200 OK
                                              Date: Sun, 20 Oct 2024 21:24:53 GMT
                                              Content-Type: text/html
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Last-Modified: Fri, 18 Oct 2024 19:31:24 GMT
                                              Cache-Control: max-age=14400
                                              CF-Cache-Status: HIT
                                              Age: 6914
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9iMWiZcRHsYczHTvVRmo4mMnFb88vOlYrZV6HvI64pLRq3R2i%2FOPGSencX8DBPynnnnrTjLrzPmyuXdmPMLqzj2ucoZrSpOQmF7rlV1GaD2Ie6ciUNjerlZXS0nY"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Acknowledge: Credit to VaultCord.com
                                              X-Powered-By: VaultCord.com
                                              content-security-policy: upgrade-insecure-requests
                                              permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                              referrer-policy: strict-origin-when-cross-origin
                                              strict-transport-security: max-age=31536000; includeSubDomains
                                              x-content-security-policy: img-src *; media-src * data:;
                                              x-content-type-options: nosniff
                                              x-frame-options: DENY
                                              x-xss-protection: 1; mode=block
                                              Server: cloudflare
                                              CF-RAY: 8d5c13cc5fc87c21-LAX
                                              2024-10-20 21:24:53 UTC246INData Raw: 37 62 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d 20 4f 70 65 6e
                                              Data Ascii: 7b3b<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth - Open
                                              2024-10-20 21:24:53 UTC1369INData Raw: 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 2f 3e 0a
                                              Data Ascii: Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author" />
                                              2024-10-20 21:24:53 UTC1369INData Raw: 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65
                                              Data Ascii: <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title" conte
                                              2024-10-20 21:24:53 UTC1369INData Raw: 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f 73 65 22 3e 0a
                                              Data Ascii: t="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Close">
                                              2024-10-20 21:24:53 UTC1369INData Raw: 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d 6c 67 20 74 65
                                              Data Ascii: city-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-lg te
                                              2024-10-20 21:24:53 UTC1369INData Raw: 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20 34 2e 32 39 33
                                              Data Ascii: ="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.293
                                              2024-10-20 21:24:53 UTC1369INData Raw: 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72 64 65 72 2d 62
                                              Data Ascii: /a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium border-b
                                              2024-10-20 21:24:53 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d
                                              Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div class=
                                              2024-10-20 21:24:53 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                              Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:17:24:49
                                              Start date:20/10/2024
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exe"
                                              Imagebase:0x7ff7482c0000
                                              File size:6'498'304 bytes
                                              MD5 hash:56E03B7A884E43071EDA33E14C114EFB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:17:24:49
                                              Start date:20/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff68cce0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:17:24:52
                                              Start date:20/10/2024
                                              Path:C:\Windows\System32\WerFault.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\WerFault.exe -u -p 4292 -s 1576
                                              Imagebase:0x7ff790a70000
                                              File size:570'736 bytes
                                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              No disassembly