Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
Analysis ID:1538283
MD5:735c2a1e22b9a2b576e9d0909dae1ef2
SHA1:21c841b458533fc0ca4b9eb8d24768bafd7c5a11
SHA256:cf11db4651ee96287b39330176a45b2cb10979e0ef3037b8b20f024580a736be
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe (PID: 7944 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe" MD5: 735C2A1E22B9A2B576E9D0909DAE1EF2)
    • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 7204 cmdline: C:\Windows\system32\WerFault.exe -u -p 7944 -s 744 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeReversingLabs: Detection: 47%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_5f4cd193-5
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.10:49716 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000003.1331566473.000002606DDC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746140267.000002606DD8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000003.1331706773.000002606DD8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/j
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/Im_X
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.10:49716 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7944 -s 744
Source: classification engineClassification label: mal96.evad.winEXE@3/6@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7952:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7944
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9154e847-5d62-4264-8c16-b9bd64ccfc0fJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeReversingLabs: Detection: 47%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7944 -s 744
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSection loaded: dpapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic file information: File size 6477824 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62d000
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeStatic PE information: section name: .vmp1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F741B50 push eax; iretd 0_3_000002606F741B51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeCode function: 0_3_000002606F742E52 push edi; retf 0_3_000002606F742E62

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeMemory written: PID: 7944 base: 7FF841A30008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeMemory written: PID: 7944 base: 7FF8418CD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeMemory written: PID: 7944 base: 7FF841A4000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeMemory written: PID: 7944 base: 7FF8418FCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERCORNER2D3DBACKSPACETABENTERPAUSEESCAPESPACEENDHOMEINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIVISUALSMISCCOLORSVISUALSVISUALS OTHERSBOX TYPEMISCMISC SETTINGSCOLOR PICKERLOBIJETTASTRARIFT_TARGETINGFORM_PC_CKAY/OBREACHBRIMSTONECHAMBERCYPHERKAY/OKILLJOYNEONOMENPHOENIXRAZEREYNASAGESKYESOVAVIPERYORUFADEBOTGEKKOHARBORDEADLOCKVYSEMEDALOVERLAYMEDALOVERLAYCLASS [ %.FM ] HEALTH RENDERED][ CR][V4L0R4NT ESP]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746447143.00007FF7F4E21000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746447143.00007FF7F4E21000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746447143.00007FF7F4E21000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeRDTSC instruction interceptor: First address: 7FF7F591362E second address: 7FF7F5913634 instructions: 0x00000000 rdtsc 0x00000002 pop edi 0x00000003 inc eax 0x00000004 cmp ah, dl 0x00000006 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSpecial instruction interceptor: First address: 7FF7F5851180 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSpecial instruction interceptor: First address: 7FF7F5851198 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(( H
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746140267.000002606DDC7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000003.1331566473.000002606DDC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeNtProtectVirtualMemory: Indirect: 0x7FF7F5373225Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe47%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
172.67.72.57
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpfalse
        unknown
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000003.1331566473.000002606DDC7000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpfalse
            unknown
            https://keyauth.win/jSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD60000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746523170.00007FF7F4F50000.00000002.00000001.01000000.00000003.sdmpfalse
              • URL Reputation: safe
              unknown
              https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://rsms.me/ThisSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746555835.00007FF7F4F9C000.00000004.00000001.01000000.00000003.sdmpfalse
                    unknown
                    https://keyauth.win:443/Im_XSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, 00000000.00000002.1746045852.000002606DD3C000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      172.67.72.57
                      keyauth.winUnited States
                      13335CLOUDFLARENETUSfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1538283
                      Start date and time:2024-10-20 23:41:32 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 59s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:12
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                      Detection:MAL
                      Classification:mal96.evad.winEXE@3/6@1/1
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.73.29
                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe, PID 7944 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      172.67.72.57SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                  lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                    flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                      Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          keyauth.winSecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSSecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.206.204
                                          SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.1.5
                                          SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.72.57
                                          No context
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.0445813109984228
                                          Encrypted:false
                                          SSDEEP:96:VlFIIKtnsthqtvGhiXSKQXIDcQwc6xlTcE3cw3P1+HbHg/8BRTf3o8Fa1WROyvOi:/lKtn7tq0OVptejo8JNzuiFrZ24lO8B
                                          MD5:790D52A13ABD9216FB2DAFFD7EC08066
                                          SHA1:B63FD741CA5592DFFBF0FEF2029DE052331AC069
                                          SHA-256:1BBB8204419E4ADD564CF0D8FE53EB5ACAF5F9FFBAEECE688955B0AAB61CC213
                                          SHA-512:2F4321A51C46C8D442F1A40A975463658BEFC896E020FDC952DD1582DBFAE453F6A24011F008006EABCFD859509A718840D9E41A088E4C3CE90F0823235A1E1D
                                          Malicious:false
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.4.1.5.0.8.0.4.4.6.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.4.1.5.1.5.7.0.0.9.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.d.9.e.8.2.f.-.6.0.4.2.-.4.7.d.b.-.9.a.2.3.-.6.7.f.7.b.2.a.d.7.1.8.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.f.1.b.6.c.1.-.8.7.f.0.-.4.5.0.5.-.9.e.0.9.-.2.4.0.3.c.5.0.1.f.d.0.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...1.1.1.6.3...2.4.2.5.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.0.8.-.0.0.0.1.-.0.0.1.3.-.b.c.a.6.-.4.9.f.4.3.8.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.f.3.1.e.f.f.9.3.3.4.a.5.a.5.3.d.3.7.a.7.a.b.a.d.c.7.d.b.8.6.8.0.0.0.0.f.f.f.f.!.0.0.0.0.2.1.c.8.4.1.b.4.5.8.5.3.3.f.c.0.c.a.4.b.9.e.b.8.d.2.4.7.6.8.b.a.f.d.7.c.5.a.1.1.!.S.e.c.u.r.i.t.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:42:31 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):202930
                                          Entropy (8bit):1.3336124554860274
                                          Encrypted:false
                                          SSDEEP:384:SXry0Z1ZhRx29BXjm+mgkUQ66D85l5azAK6hqtmhjPMbz:SbHx29Bq9UID85l5adRwhjAz
                                          MD5:E24F1AEC2894B821D528B0728E6F7689
                                          SHA1:FF633D166B4482D6A7E27CC99B686423091AF6AC
                                          SHA-256:4AFAC9719FEE34F148926B3F1172BE58E4B75C03925B712AB10C94BBEB76B28D
                                          SHA-512:9D4048A3F71A7172509D830B18193E28A645CF28AE441708B4E2AE8DE8516704F851C849F002E0B1AE76E6F4C0E250FBC764A7E5D3D32668694DCB8C7C56E7E3
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... .......Gy.g....................................$....!......d....s..........`.......8...........T........... ;...............!...........#..............................................................................eJ......p$......Lw......................T...........By.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):8974
                                          Entropy (8bit):3.6998697947326042
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJ3Ed6YWhf3WMgmfsHJFI5pDY89byrkftGm:R6lXJ0d6Ywf3WMgmfMbIpyYf1
                                          MD5:2C19C29941F47156A978BE941EFB7FBE
                                          SHA1:2629D082F4E130B04AD3DAEF9E4487E206184FDF
                                          SHA-256:D02500094DC31382CE9B78DB597C333E00FBF3F22C658F974B5365978DAF517C
                                          SHA-512:7F5B975D4A0263A3278885F3017D2B68DE219A5567FEFD8B84773CBC409EEEF0A123539CC07300A4E77A202B5F7D0C475E3A049A51C142C1B8CB1ACC30A70394
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.4.4.<./.P.i.
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4951
                                          Entropy (8bit):4.523831079835683
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zsQQJg771I9IAUXWpW8VY+Ym8M4J5BzJsFiyq8v2zJsXsEfVfRd:uIjfQWI79AUm7VmJFWJXsIlRd
                                          MD5:A2DDD890D535805BA977ADEED0B562EA
                                          SHA1:B3A8A26C0D6D6E70F568C42899F917EC20A80CD3
                                          SHA-256:F22F2DE4FAFBD361A4D1D0C0CCF71FA2C04A235B6675E86EADED58FD0FA69C09
                                          SHA-512:5A3E0A7963F477FE8790C93EB98B0F9E66400696CE2FAC82B1872C047DDAC5504BCF68D95349B94D3E61D4986A44DFB47CCE95F58BBB604B0F42A3F6F80AA637
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552285" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\System32\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.295941365081278
                                          Encrypted:false
                                          SSDEEP:6144:Y41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+aNmBMZJh1VjA:V1/YCW2AoQ0NiwNwMHrVM
                                          MD5:26C554352C992996E4716CE6A5A818AD
                                          SHA1:559E3E42FB5894011624203223BB90E2545794A0
                                          SHA-256:87C74761349DA2176EE6DB17306675EBDE197CEB7F2A324EF3983B1A6FA895BA
                                          SHA-512:0CA1F3BA0B79EC58E29121D517D7A4B7EFE1354BA22BB43D80395D124DFFF47162A7DF1CDED25F766B9C82A25286EFE414FC645BDAB9CC8379D1A921A19D7A76
                                          Malicious:false
                                          Reputation:low
                                          Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmR...8#..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):208
                                          Entropy (8bit):2.4305258110308814
                                          Encrypted:false
                                          SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                          MD5:FC51E3860D2A83AD586811F10DFB46C0
                                          SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                          SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                          SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                          Entropy (8bit):7.924097233699779
                                          TrID:
                                          • Win64 Executable Console (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                                          File size:6'477'824 bytes
                                          MD5:735c2a1e22b9a2b576e9d0909dae1ef2
                                          SHA1:21c841b458533fc0ca4b9eb8d24768bafd7c5a11
                                          SHA256:cf11db4651ee96287b39330176a45b2cb10979e0ef3037b8b20f024580a736be
                                          SHA512:aebcc037cfbf959369483b430cb2e9f0fd6ccad936f64b154458ccd7250ea2309d791b887c14fbe0c47e8e6ee18f10b57fdf2e4b4715496cbc8fe9050ed1b2d5
                                          SSDEEP:98304:C0zm4QMi94q58PVatM0re8yNmxf93Sg8iB/oxKfAgqd5f1mUS:rzQ4q5IEtBrPtSZiCTgqnUl
                                          TLSH:F26622BDA14C375CC06EC8349537AD4475B6513E1EFA55AAF2CB7BC07BAE420D682B02
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...l4.f.........."....&..............]........@..........................................`................................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0x1405d9c89
                                          Entrypoint Section:.vmp1
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows cui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x66EE346C [Sat Sep 21 02:50:20 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:a6aebe838a2989889cba7e0b9bdcd74b
                                          Instruction
                                          push AA40D8EFh
                                          call 00007F37A117CAEFh
                                          xchg dword ptr [ebp-22h], edi
                                          mov ch, FDh
                                          retf
                                          adc ah, ah
                                          insb
                                          jmp 00007F37A0C89599h
                                          int3
                                          fisubr dword ptr [ebx+eax*8+5Ah]
                                          cld
                                          sbb dl, byte ptr [ebx+21464D04h]
                                          xchg eax, ebx
                                          mov ebx, 6CFCDA18h
                                          retn 6C90h
                                          jmp far fword ptr [eax+esi*8+4Bh]
                                          cld
                                          add dword ptr [ebx+2FBBCFC7h], edx
                                          xchg eax, ebx
                                          push ebp
                                          and dword ptr [ebx], edx
                                          out dx, al
                                          insb
                                          stosd
                                          or dl, byte ptr [edi]
                                          loope 00007F37A0C8963Eh
                                          mov byte ptr [6CD1F645h], al
                                          aaa
                                          adc eax, 47931629h
                                          inc ecx
                                          cmc
                                          sub byte ptr [ebx-173A03E3h], dl
                                          insb
                                          pushfd
                                          inc ebx
                                          jnle 00007F37A0C895A5h
                                          insb
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x5aa8a80xc4f.vmp1
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa266680x2bc.vmp1
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb8e0000x1e0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb7cf200xff60.vmp1
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb8d0000xec.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x56cab80x30.vmp1
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb7cde00x140.vmp1
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x5720000x280.vmp1
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x12e0300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x1300000x4b4e80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x17c0000x567b00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x1d30000xd2000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .vmp00x1e10000x37e01a0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .vmp10x5600000x62ce800x62d000cc7603d0bbaea13bf0a7f184f73563f9unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .reloc0xb8d0000xec0x200166a78abf2e51f6d1b2cb5e6967fe1feFalse0.357421875GLS_BINARY_LSB_FIRST2.189963303975242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0xb8e0000x1e00x200e218d0362d067b3f8d250010add59d14False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_MANIFEST0xb8e0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                          DLLImport
                                          d3d11.dllD3D11CreateDeviceAndSwapChain
                                          D3DCOMPILER_47.dllD3DCompile
                                          KERNEL32.dllReadFile
                                          USER32.dllSetCursor
                                          ADVAPI32.dllControlService
                                          MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
                                          dwmapi.dllDwmExtendFrameIntoClientArea
                                          WINHTTP.dllWinHttpSendRequest
                                          CRYPT32.dllCertCreateCertificateChainEngine
                                          IMM32.dllImmReleaseContext
                                          Normaliz.dllIdnToAscii
                                          WLDAP32.dll
                                          WS2_32.dllsendto
                                          RPCRT4.dllRpcStringFreeA
                                          PSAPI.DLLGetModuleInformation
                                          USERENV.dllUnloadUserProfile
                                          VCRUNTIME140_1.dll__CxxFrameHandler4
                                          VCRUNTIME140.dll__current_exception_context
                                          api-ms-win-crt-runtime-l1-1-0.dllexit
                                          api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s
                                          api-ms-win-crt-heap-l1-1-0.dllfree
                                          api-ms-win-crt-math-l1-1-0.dllcos
                                          api-ms-win-crt-string-l1-1-0.dllstrncmp
                                          api-ms-win-crt-convert-l1-1-0.dllatof
                                          api-ms-win-crt-utility-l1-1-0.dllqsort
                                          api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
                                          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                          api-ms-win-crt-time-l1-1-0.dll_time64
                                          SHELL32.dllShellExecuteA
                                          WTSAPI32.dllWTSSendMessageW
                                          KERNEL32.dllGetSystemTimeAsFileTime
                                          USER32.dllGetUserObjectInformationW
                                          KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                          USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 23:42:29.629673958 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:29.629723072 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:29.629791975 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:29.632534981 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:29.632555962 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.404253006 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.404474974 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.408586979 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.408596992 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.408946037 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.464273930 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.495841026 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.543410063 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.674932003 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675062895 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675153971 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675174952 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.675194979 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675239086 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.675246954 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675338984 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675424099 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.675431013 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675617933 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.675672054 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.675684929 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.679366112 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.679462910 CEST49716443192.168.2.10172.67.72.57
                                          Oct 20, 2024 23:42:30.679471016 CEST44349716172.67.72.57192.168.2.10
                                          Oct 20, 2024 23:42:30.681312084 CEST49716443192.168.2.10172.67.72.57
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 20, 2024 23:42:29.612699032 CEST5817253192.168.2.101.1.1.1
                                          Oct 20, 2024 23:42:29.620183945 CEST53581721.1.1.1192.168.2.10
                                          Oct 20, 2024 23:42:46.940944910 CEST53611441.1.1.1192.168.2.10
                                          Oct 20, 2024 23:42:48.705843925 CEST53552221.1.1.1192.168.2.10
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 20, 2024 23:42:29.612699032 CEST192.168.2.101.1.1.10xad1cStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 20, 2024 23:42:29.620183945 CEST1.1.1.1192.168.2.100xad1cNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                          Oct 20, 2024 23:42:29.620183945 CEST1.1.1.1192.168.2.100xad1cNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                          Oct 20, 2024 23:42:29.620183945 CEST1.1.1.1192.168.2.100xad1cNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                          • keyauth.win
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.1049716172.67.72.574437944C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-20 21:42:30 UTC95OUTGET / HTTP/1.1
                                          Connection: Keep-Alive
                                          User-Agent: CPlusPlusExample/1.0
                                          Host: keyauth.win
                                          2024-10-20 21:42:30 UTC1128INHTTP/1.1 200 OK
                                          Date: Sun, 20 Oct 2024 21:42:30 GMT
                                          Content-Type: text/html
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                          Cache-Control: max-age=14400
                                          CF-Cache-Status: HIT
                                          Age: 714
                                          Accept-Ranges: bytes
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TnlCr4%2FDdX42Zl55CWZYafJejbEPUKlQlnYHHOjHpwwFYZ3Aea4Y4N1h6HIWgUvYcFrIcSP6jU34MPfZKJk6DenslR%2Bu6q1mUT%2Bb%2Bu5dMrjY5lHYWrgseQNBO9t9"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Acknowledge: Credit to VaultCord.com
                                          X-Powered-By: VaultCord.com
                                          content-security-policy: upgrade-insecure-requests
                                          permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                          referrer-policy: strict-origin-when-cross-origin
                                          strict-transport-security: max-age=31536000; includeSubDomains
                                          x-content-security-policy: img-src *; media-src * data:;
                                          x-content-type-options: nosniff
                                          x-frame-options: DENY
                                          x-xss-protection: 1; mode=block
                                          Server: cloudflare
                                          CF-RAY: 8d5c2d9928077cce-LAX
                                          2024-10-20 21:42:30 UTC241INData Raw: 37 62 33 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d
                                          Data Ascii: 7b36<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth -
                                          2024-10-20 21:42:30 UTC1369INData Raw: 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72
                                          Data Ascii: Open Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author
                                          2024-10-20 21:42:30 UTC1369INData Raw: 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20
                                          Data Ascii: "> <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title"
                                          2024-10-20 21:42:30 UTC1369INData Raw: 6f 6e 74 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f
                                          Data Ascii: ontent="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Clo
                                          2024-10-20 21:42:30 UTC1369INData Raw: 72 3a 6f 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d
                                          Data Ascii: r:opacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-
                                          2024-10-20 21:42:30 UTC1369INData Raw: 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20
                                          Data Ascii: xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293
                                          2024-10-20 21:42:30 UTC1369INData Raw: 75 72 65 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72
                                          Data Ascii: ures</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium bor
                                          2024-10-20 21:42:30 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63
                                          Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div c
                                          2024-10-20 21:42:30 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                          Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature
                                          2024-10-20 21:42:30 UTC1369INData Raw: 31 34 2e 32 32 38 63 2e 33 30 39 2d 31 2e 32 34 2d 2e 34 37 33 2d 31 2e 38 2d 31 2e 32 38 32 2d 31 2e 34 33 34 5a 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 70 61 74 68 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 73 76 67 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                          Data Ascii: 14.228c.309-1.24-.473-1.8-1.282-1.434Z"> </path> </svg> </div>


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:17:42:26
                                          Start date:20/10/2024
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exe"
                                          Imagebase:0x7ff7f4e20000
                                          File size:6'477'824 bytes
                                          MD5 hash:735C2A1E22B9A2B576E9D0909DAE1EF2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:17:42:26
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff620390000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:17:42:30
                                          Start date:20/10/2024
                                          Path:C:\Windows\System32\WerFault.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 7944 -s 744
                                          Imagebase:0x7ff716e60000
                                          File size:570'736 bytes
                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          No disassembly