Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
Analysis ID:1538281
MD5:bf4a5095bfaeb6ea3b1e64a3877c28e1
SHA1:be5a349c2bc194663ffa5cf4991c35fd5dd2ea5f
SHA256:7d1eb02c78aff7451e6eeabf137e9a6d4ba7c4a29e394c83d60043771f6be552
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe (PID: 5968 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe" MD5: BF4A5095BFAEB6EA3B1E64A3877C28E1)
    • conhost.exe (PID: 5500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5656 cmdline: C:\Windows\system32\WerFault.exe -u -p 5968 -s 860 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe PID: 5968JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeAvira: detected
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeReversingLabs: Detection: 44%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c10ed6c3-e
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49707 version: TLS 1.2
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
    Source: global trafficDNS traffic detected: DNS query: keyauth.win
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://185.101.104.122/scbronkz.dll
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://185.101.104.122/scbronkz.dllC:
    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4A9D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1433085704.00000286E4A9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49707 version: TLS 1.2

    System Summary

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: .vmp0 and .vmp1 section names
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5968 -s 860
    Source: classification engineClassification label: mal100.evad.winEXE@3/6@1/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5500:120:WilError_03
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5968
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d487089a-77ca-442f-9d79-b997278ded85Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeReversingLabs: Detection: 44%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe"
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5968 -s 860
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSection loaded: dpapi.dllJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic file information: File size 5839872 > 1048576
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x591400
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: section name: .vmp0
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeStatic PE information: section name: .vmp1

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeMemory written: PID: 5968 base: 7FF9082F0008 value: E9 EB D9 E9 FF Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeMemory written: PID: 5968 base: 7FF90818D9F0 value: E9 20 26 16 00 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeMemory written: PID: 5968 base: 7FF90830000D value: E9 BB CB EB FF Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeMemory written: PID: 5968 base: 7FF9081BCBC0 value: E9 5A 34 14 00 Jump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCESSHACKER.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1432990489.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: REGMON.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHSTRING TOO LONGBAD CAST*CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WINDBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEG
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FIDDLER.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530536221.00007FF657711000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WIRESHARK.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FILEMON.EXE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF6580717F7 second address: 7FF658071817 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 btr ax, FFB5h 0x00000009 btc edx, 6Ah 0x0000000d xor cl, FFFFFF83h 0x00000010 inc cx 0x00000012 cmp edi, E980290Ch 0x00000018 xchg byte ptr [esi-2Dh], ah 0x0000001b rol byte ptr [edi+ecx-4Dh], cl 0x0000001f ror byte ptr [edi], 00000031h
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF658071817 second address: 7FF65807181D instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 rol cl, 1 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF658003033 second address: 7FF658003065 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 push edx 0x00000004 xadd di, ax 0x00000008 dec ebp 0x00000009 movzx eax, di 0x0000000c dec esp 0x0000000d mov eax, dword ptr [esp+00000090h] 0x00000014 add di, di 0x00000017 inc ecx 0x00000018 add eax, 513E3ED3h 0x0000001e not ax 0x00000021 movsx edx, sp 0x00000024 inc eax 0x00000025 rcr dh, 00000042h 0x00000028 inc ecx 0x00000029 ror eax, 1 0x0000002b dec eax 0x0000002c btr edx, ecx 0x0000002f inc ecx 0x00000030 bswap eax 0x00000032 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF658003065 second address: 7FF658003096 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 cmp al, FFFFFFA8h 0x00000006 dec eax 0x00000007 movsx esi, bp 0x0000000a inc ecx 0x0000000b add eax, 7E8E46BBh 0x00000011 inc ecx 0x00000012 bswap eax 0x00000014 inc esp 0x00000015 bts eax, esi 0x00000018 inc cx 0x0000001a mov edx, edx 0x0000001c dec eax 0x0000001d arpl ax, bp 0x0000001f inc ecx 0x00000020 sub eax, 037A29CDh 0x00000026 dec ecx 0x00000027 adc esi, ecx 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c add eax, edx 0x0000002e not bp 0x00000031 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF65805C657 second address: 7FF657F5CB39 instructions: 0x00000000 rdtsc 0x00000002 pop eax 0x00000003 inc esp 0x00000004 bsf ebp, eax 0x00000007 pop ebx 0x00000008 inc eax 0x00000009 shr bh, cl 0x0000000b inc ecx 0x0000000c pop ebp 0x0000000d dec esp 0x0000000e movsx edx, bp 0x00000011 cmc 0x00000012 inc ecx 0x00000013 rcr cl, 0000005Fh 0x00000016 pop edx 0x00000017 inc ecx 0x00000018 pop esi 0x00000019 dec eax 0x0000001a sal ecx, cl 0x0000001c inc ecx 0x0000001d pop ecx 0x0000001e inc ax 0x00000020 movzx ecx, bh 0x00000023 dec esp 0x00000024 movsx edi, ax 0x00000027 inc sp 0x00000029 bts edi, eax 0x0000002c pop ebp 0x0000002d dec esp 0x0000002e movsx edx, sp 0x00000031 dec ecx 0x00000032 add eax, 00F16886h 0x00000038 inc cx 0x0000003a shl edi, 23h 0x0000003d inc ecx 0x0000003e pop eax 0x0000003f pop edi 0x00000040 inc ecx 0x00000041 pop esp 0x00000042 inc esp 0x00000043 movzx edi, sp 0x00000046 pop ecx 0x00000047 cmp cx, 1DFAh 0x0000004c inc esp 0x0000004d sub dl, ch 0x0000004f popfd 0x00000050 inc ecx 0x00000051 pop edi 0x00000052 inc sp 0x00000054 movsx edx, bl 0x00000057 inc ecx 0x00000058 pop edx 0x00000059 ret 0x0000005a popfd 0x0000005b rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF657A9639F second address: 7FF657A963BF instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 btr ax, FFB5h 0x00000009 btc edx, 6Ah 0x0000000d xor cl, FFFFFF83h 0x00000010 inc cx 0x00000012 cmp edi, E980290Ch 0x00000018 xchg byte ptr [esi-2Dh], ah 0x0000001b rol byte ptr [edi+ecx-4Dh], cl 0x0000001f ror byte ptr [edi], 00000031h
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF657A963BF second address: 7FF657A963C5 instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 rol cl, 1 0x00000006 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF657AD27A4 second address: 7FF657AD27D6 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 push edx 0x00000004 xadd di, ax 0x00000008 dec ebp 0x00000009 movzx eax, di 0x0000000c dec esp 0x0000000d mov eax, dword ptr [esp+00000090h] 0x00000014 add di, di 0x00000017 inc ecx 0x00000018 add eax, 513E3ED3h 0x0000001e not ax 0x00000021 movsx edx, sp 0x00000024 inc eax 0x00000025 rcr dh, 00000042h 0x00000028 inc ecx 0x00000029 ror eax, 1 0x0000002b dec eax 0x0000002c btr edx, ecx 0x0000002f inc ecx 0x00000030 bswap eax 0x00000032 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF657AD27D6 second address: 7FF657AD2807 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 cmp al, FFFFFFA8h 0x00000006 dec eax 0x00000007 movsx esi, bp 0x0000000a inc ecx 0x0000000b add eax, 7E8E46BBh 0x00000011 inc ecx 0x00000012 bswap eax 0x00000014 inc esp 0x00000015 bts eax, esi 0x00000018 inc cx 0x0000001a mov edx, edx 0x0000001c dec eax 0x0000001d arpl ax, bp 0x0000001f inc ecx 0x00000020 sub eax, 037A29CDh 0x00000026 dec ecx 0x00000027 adc esi, ecx 0x00000029 dec eax 0x0000002a cwde 0x0000002b dec ebp 0x0000002c add eax, edx 0x0000002e not bp 0x00000031 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeRDTSC instruction interceptor: First address: 7FF6579FBAA7 second address: 7FF6579FD388 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ecx 0x00000004 cwde 0x00000005 inc ax 0x00000007 movsx edi, bh 0x0000000a pop edi 0x0000000b inc eax 0x0000000c setp dh 0x0000000f inc ecx 0x00000010 pop eax 0x00000011 inc cx 0x00000013 movsx eax, dh 0x00000016 pop ebx 0x00000017 dec eax 0x00000018 cwde 0x00000019 dec ebp 0x0000001a movsx edi, bx 0x0000001d jmp 00007F1EFCDA36AEh 0x00000022 inc ecx 0x00000023 pop esp 0x00000024 dec eax 0x00000025 movsx ebp, cx 0x00000028 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSpecial instruction interceptor: First address: 7FF657F5CB39 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSpecial instruction interceptor: First address: 7FF657F5CB51 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
    Source: Amcache.hve.5.drBinary or memory string: VMware
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000003.1432990489.00000286E4AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeHandle closed: DEADC0DE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeProcess queried: DebugObjectHandleJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe PID: 5968, type: MEMORYSTR
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeNtProtectVirtualMemory: Indirect: 0x7FF657B15461Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    11
    Virtualization/Sandbox Evasion
    1
    Credential API Hooking
    521
    Security Software Discovery
    Remote Services1
    Credential API Hooking
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Abuse Elevation Control Mechanism
    1
    Process Injection
    LSASS Memory11
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Abuse Elevation Control Mechanism
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS23
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe45%ReversingLabsWin64.Trojan.Generic
    SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe100%AviraHEUR/AGEN.1315472
    SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    keyauth.win
    104.26.1.5
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://keyauth.win/false
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530284336.00000286E4AB8000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmpfalse
              unknown
              http://185.101.104.122/scbronkz.dllC:SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpfalse
                unknown
                https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpfalse
                • URL Reputation: safe
                unknown
                https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530226319.00000286E4A5C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530603538.00007FF65779B000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  http://185.101.104.122/scbronkz.dllSecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, 00000000.00000002.1530582637.00007FF65777F000.00000002.00000001.01000000.00000003.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.26.1.5
                    keyauth.winUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1538281
                    Start date and time:2024-10-20 23:30:00 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 28s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                    Detection:MAL
                    Classification:mal100.evad.winEXE@3/6@1/1
                    EGA Information:Failed
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 104.208.16.94
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                    • Execution Graph export aborted for target SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe, PID 5968 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                    TimeTypeDescription
                    17:31:10API Interceptor1x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.26.1.5SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                      lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                        oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                          G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                            Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                4.7.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win32.Evo-gen.24813.27582.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.Evo-gen.25703.16605.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winSecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.21448.26007.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSSecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.21448.26007.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):1.005807663669075
                                        Encrypted:false
                                        SSDEEP:96:kQfFck/3sXhq4GhiXSKQXIDcQjc6rUcEtcw3lRV+HbHg/8BRTf3cUpweWFtlK9o6:7V/3xl09MXRRyj8JFzzuiFwZ24lO8Cq
                                        MD5:D9C5890D62674CA050CD9C275B1E7B4A
                                        SHA1:30318147119C40171648648D7C5B6AF124D3A98C
                                        SHA-256:090CEEE509DCEA01FC75D132A9D17A21DA97CB81719DC9531C2C2CD89F7589C2
                                        SHA-512:9DB627F7A4F9159D379955180ED5C7E901A5C89757E3E9AD4A34014505CBCA17410AE4285A44DEFAF8F2B49C82287AAEACE6669AD07B76778D61A244275D6772
                                        Malicious:false
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.3.4.6.0.9.5.0.2.2.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.3.4.6.1.3.8.7.6.9.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.6.8.6.0.c.c.-.5.5.6.a.-.4.9.5.8.-.9.c.d.2.-.f.5.4.9.3.2.a.6.d.c.b.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.3.a.c.d.b.2.-.4.2.d.4.-.4.d.1.d.-.a.6.8.9.-.8.4.8.8.4.a.1.a.d.2.b.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...E.v.o.-.g.e.n...2.4.4.0.2...1.5.7.0.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.5.0.-.0.0.0.1.-.0.0.1.4.-.b.1.6.b.-.8.6.5.8.3.7.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.c.3.7.f.d.c.5.e.1.7.6.7.a.4.7.b.1.f.9.b.a.1.1.e.d.2.0.a.e.1.5.0.0.0.0.f.f.f.f.!.0.0.0.0.b.e.5.a.3.4.9.c.2.b.c.1.9.4.6.6.3.f.f.a.5.c.f.4.9.9.1.c.3.5.f.d.5.d.d.2.e.a.5.f.!.S.e.c.u.r.i.t.e.I.n.f.o.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:31:01 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):201426
                                        Entropy (8bit):1.3467443223376139
                                        Encrypted:false
                                        SSDEEP:384:bu+P4Fb07CtBuxnrf9PM19uVPQ5tgAGqeb0YcEkJ8KuWA2gCU+qDS:lP807CtBuVWI0YcEOAEwS
                                        MD5:4BE282A3BE39F90A691EB9F7AE041FBB
                                        SHA1:8EC59EC667F496DE26A35FB09DCCE92752DE446F
                                        SHA-256:644D2C5D07EFF10BDD5D04E6EE098783D5B787401E145A0BEC136F75072F06B8
                                        SHA-512:73B42B56947F09B06D78C34B192E21B3A847836E12FE020F2412C9A62B1B6210874E5D74BEBDB7ADF88017C05E65DB88C6CDE835653C7145FCE3B46A53DF6C5D
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ........v.g....................................<..............."q..........`.......8...........T............9...........................!..............................................................................eJ......l"......Lw......................T.......P....v.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8954
                                        Entropy (8bit):3.6998334101831296
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJpfAMVW6YcDNys+0UgmfBJFTspDM89b9/8f5fm:R6lXJp4MW6Yays+0UgmfBbE9kfM
                                        MD5:5BF7E188FA71BC3216C84B33B5870518
                                        SHA1:C1A4C202D897478230EF3C1E5F691E31156CF762
                                        SHA-256:D948AE1FE1FC295B6D32FC04563641AA2AE00CAE981A8E0859E23F8698C770F9
                                        SHA-512:2ADA9DB374815CC0F21988FE4C46B68A7D782C886101068C360634F00BBFE84A705FAA3795AD9B2E51667C95EEE792E14891D3709B6F8285F692114E2131202F
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.6.8.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4926
                                        Entropy (8bit):4.511455584949958
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zseJg771I9NCWpW8VY4cYm8M4J5FYJsFNyq8v2YJXnZdeztzVd:uIjfUI7WD7VB5JRWznE5Vd
                                        MD5:21336C55085D47C0CDD9DCD4AA83F647
                                        SHA1:5EF8EC79A5EC67FD4D2657C20E7C5F47E07C9D1F
                                        SHA-256:90F1F61A4121B999BBCBF3E86DCE2996238A262F8BE3926E7655407BBF087B06
                                        SHA-512:D13B6C1452EEC56AF5B6D6FE4E368C1A931E76D813B1E16527232B848560DBEAF5844862D7137B26441C5E081830E203F741ACCA6C547A45CE3F97392FE71561
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552273" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.394157582211947
                                        Encrypted:false
                                        SSDEEP:6144:cl4fiJoH0ncNXiUjt10q5G/gaocYGBoaUMMhA2NX4WABlBuNA/OBSqa:U4vF5MYQUMM6VFYS/U
                                        MD5:8A1BC79D3AA01293CC9DC584C81F89C7
                                        SHA1:914441A3B0B2ABD4CC5C3B4230FB2FD2E19B6687
                                        SHA-256:DF58860D73D9DA28B9BDC9279C02F4F832C19B5B492951ADB6192E7A2B262002
                                        SHA-512:12E2FA5A9D22BE17A875755BF079662C3D92B5D93FD129CBCC1F378F1F05D56B5177E6AC3D842649C700D1FDA4D56D23EA54ED78DD3AD6091C6EB2392ADB992A
                                        Malicious:false
                                        Reputation:low
                                        Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...[7#.................................................................................................................................................................................................................................................................................................................................................o........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):208
                                        Entropy (8bit):2.4305258110308814
                                        Encrypted:false
                                        SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                        MD5:FC51E3860D2A83AD586811F10DFB46C0
                                        SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                        SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                        SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                        Malicious:false
                                        Reputation:low
                                        Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):7.910794518601024
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                                        File size:5'839'872 bytes
                                        MD5:bf4a5095bfaeb6ea3b1e64a3877c28e1
                                        SHA1:be5a349c2bc194663ffa5cf4991c35fd5dd2ea5f
                                        SHA256:7d1eb02c78aff7451e6eeabf137e9a6d4ba7c4a29e394c83d60043771f6be552
                                        SHA512:503f304597026f2da65793092b1c5408052b274e525f081e4e1b2c0ff15d4cc10b84c8e71587867c92acbb0c28ac6445fe6468119ba89d8641ec788b6c8903b1
                                        SSDEEP:98304:+S5p97SNb17jiDzQhsGDf8pmmExYMKoD6VRwoWJ9CqnvEHGynuH91a:+cPSNb5iHwjDf2QYMPD6RgnvEmIudU
                                        TLSH:EC4622FC6154379CC81ACC345433ED49F2B6111E07F8D6AAB2DB3680BFA74659A12F4A
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...,5.f.........."....&.....&.......7~........@.............................P............`................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x1407e37a2
                                        Entrypoint Section:.vmp1
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66EE352C [Sat Sep 21 02:53:32 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:c9826fadc3dac0724a66f56b1b1a02ba
                                        Instruction
                                        push 2B7F2D27h
                                        call 00007F1EFD2AF178h
                                        cdq
                                        stc
                                        xchg eax, esp
                                        and al, D7h
                                        fisub word ptr [ebx]
                                        iretd
                                        and al, A7h
                                        jnl 00007F1EFD1173B1h
                                        push edx
                                        and al, 52h
                                        and ah, cl
                                        bound ebx, dword ptr [ebx]
                                        jnbe 00007F1EFD117461h
                                        sub ebx, ebx
                                        into
                                        sbb byte ptr [esi], cl
                                        inc ecx
                                        fistp dword ptr [edi]
                                        std
                                        scasd
                                        and al, EBh
                                        not byte ptr [ebx]
                                        out 24h, al
                                        inc esi
                                        inc edx
                                        xchg eax, ebx
                                        sub ebx, ebx
                                        ret
                                        push edi
                                        xchg eax, esi
                                        or ebx, ebx
                                        cmpsd
                                        cmp edx, dword ptr [edx+580224BFh]
                                        mov dl, D3h
                                        and al, F0h
                                        scasb
                                        cmc
                                        daa
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x436b700xc4f.vmp1
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x846dc80x26c.vmp1
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a40000x1e0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x99aaa00x7890.vmp1
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a30000xd4.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x495a880x30.vmp1
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x99a9600x140.vmp1
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x4230000x240.vmp1
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x6d1500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x6f0000x1b8720x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x8b0000x17000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x8d0000x4b300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .vmp00x920000x37e2d20x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .vmp10x4110000x5913300x5914008cd71fef318ee113bd9c4a7d3e849927unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .reloc0x9a30000xd40x2008e6e301ed4af634b562e131327d42259False0.33984375GLS_BINARY_LSB_FIRST2.1197943657516163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x9a40000x1e00x2004ee054eee761340d1c94cd94f579b460False0.537109375data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x9a40580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        KERNEL32.dllGetProcessHeap
                                        USER32.dllGetWindowLongPtrW
                                        MSVCP140.dll??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
                                        WINHTTP.dllWinHttpOpen
                                        CRYPT32.dllCertOpenStore
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        WS2_32.dllsocket
                                        RPCRT4.dllUuidCreate
                                        PSAPI.DLLGetModuleInformation
                                        USERENV.dllUnloadUserProfile
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        VCRUNTIME140.dll__C_specific_handler
                                        api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf
                                        api-ms-win-crt-heap-l1-1-0.dllfree
                                        api-ms-win-crt-utility-l1-1-0.dllqsort
                                        api-ms-win-crt-string-l1-1-0.dllstrncmp
                                        api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
                                        api-ms-win-crt-time-l1-1-0.dll_time64
                                        api-ms-win-crt-convert-l1-1-0.dllatoi
                                        api-ms-win-crt-locale-l1-1-0.dlllocaleconv
                                        api-ms-win-crt-math-l1-1-0.dll_dclass
                                        ADVAPI32.dllCryptReleaseContext
                                        SHELL32.dllShellExecuteA
                                        WTSAPI32.dllWTSSendMessageW
                                        KERNEL32.dllGetSystemTimeAsFileTime
                                        USER32.dllGetUserObjectInformationW
                                        KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                        USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:31:00.399880886 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:00.399918079 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:00.399985075 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:00.407376051 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:00.407393932 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.189361095 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.189440012 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.285187960 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.285202980 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.285609007 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.325671911 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.386385918 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.431404114 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558337927 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558387995 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558422089 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558449984 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558464050 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.558479071 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558491945 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.558528900 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558576107 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558608055 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.558617115 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.558672905 CEST49707443192.168.2.9104.26.1.5
                                        Oct 20, 2024 23:31:01.558721066 CEST44349707104.26.1.5192.168.2.9
                                        Oct 20, 2024 23:31:01.563328028 CEST49707443192.168.2.9104.26.1.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:31:00.380579948 CEST5056253192.168.2.91.1.1.1
                                        Oct 20, 2024 23:31:00.387976885 CEST53505621.1.1.1192.168.2.9
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:31:00.380579948 CEST192.168.2.91.1.1.10x55c3Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:31:00.387976885 CEST1.1.1.1192.168.2.90x55c3No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:31:00.387976885 CEST1.1.1.1192.168.2.90x55c3No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:31:00.387976885 CEST1.1.1.1192.168.2.90x55c3No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.949707104.26.1.54435968C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-20 21:31:01 UTC95OUTGET / HTTP/1.1
                                        Connection: Keep-Alive
                                        User-Agent: CPlusPlusExample/1.0
                                        Host: keyauth.win
                                        2024-10-20 21:31:01 UTC1125INHTTP/1.1 200 OK
                                        Date: Sun, 20 Oct 2024 21:31:01 GMT
                                        Content-Type: text/html
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                        Cache-Control: max-age=14400
                                        CF-Cache-Status: HIT
                                        Age: 25
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FXzl2ePCN1CwwmJtf95CeBGXv9c40f0jJiP7itzUVOTJtvAHiIvQlsnSevVttyprjBZhEJmoc%2F1cB9Ew%2FDiywuVCJRCGtnDXh5MUfSoS2GLZy6PumUJxJ4%2FjMKXp"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Acknowledge: Credit to VaultCord.com
                                        X-Powered-By: VaultCord.com
                                        content-security-policy: upgrade-insecure-requests
                                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                        referrer-policy: strict-origin-when-cross-origin
                                        strict-transport-security: max-age=31536000; includeSubDomains
                                        x-content-security-policy: img-src *; media-src * data:;
                                        x-content-type-options: nosniff
                                        x-frame-options: DENY
                                        x-xss-protection: 1; mode=block
                                        Server: cloudflare
                                        CF-RAY: 8d5c1cc62ffbcb94-LAX
                                        2024-10-20 21:31:01 UTC244INData Raw: 37 62 33 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d 20 4f 70
                                        Data Ascii: 7b39<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth - Op
                                        2024-10-20 21:31:01 UTC1369INData Raw: 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 2f
                                        Data Ascii: en Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author" /
                                        2024-10-20 21:31:01 UTC1369INData Raw: 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e
                                        Data Ascii: <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title" con
                                        2024-10-20 21:31:01 UTC1369INData Raw: 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f 73 65 22
                                        Data Ascii: ent="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Close"
                                        2024-10-20 21:31:01 UTC1369INData Raw: 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d 6c 67 20
                                        Data Ascii: pacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-lg
                                        2024-10-20 21:31:01 UTC1369INData Raw: 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20 34 2e 32
                                        Data Ascii: ns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.2
                                        2024-10-20 21:31:01 UTC1369INData Raw: 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72 64 65 72
                                        Data Ascii: s</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium border
                                        2024-10-20 21:31:01 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73
                                        Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div clas
                                        2024-10-20 21:31:01 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                        Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:30:55
                                        Start date:20/10/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.24402.15705.exe"
                                        Imagebase:0x7ff657710000
                                        File size:5'839'872 bytes
                                        MD5 hash:BF4A5095BFAEB6EA3B1E64A3877C28E1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:17:30:55
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:17:31:00
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 5968 -s 860
                                        Imagebase:0x7ff7c1150000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        No disassembly