Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
Analysis ID:1538285
MD5:18806c401f2e1cfd826d24d79dd62e13
SHA1:ea26bc33346af2ec4b5f8fb0671f5eb14b6f31c3
SHA256:585524cf95f35c1581c0de8ed8ab1a5ef35b0bc4b50d90b25f1af20b97058897
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe (PID: 5336 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe" MD5: 18806C401F2E1CFD826D24D79DD62E13)
    • conhost.exe (PID: 3204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5660 cmdline: C:\Windows\system32\WerFault.exe -u -p 5336 -s 708 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe PID: 5336JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeAvira: detected
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeReversingLabs: Detection: 50%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_16bb1d91-0
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49734 version: TLS 1.2
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: h.pdB source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287495221.00007FF75CB78000.00000020.00000001.01000000.00000003.sdmp
    Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
    Source: global trafficDNS traffic detected: DNS query: keyauth.win
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://185.101.104.122/scbronkz09.dll
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://185.101.104.122/scbronkz09.dllC:
    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286953051.0000024127062000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412707F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241143427.0000024127062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/7-vY
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/L=jX
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286953051.0000024127062000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241143427.0000024127062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/ptember
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/berNovemberDecemberAMPMMM/dd/yydddd
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/y
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49734 version: TLS 1.2

    System Summary

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: .vmp0 and .vmp1 section names
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5336 -s 708
    Source: classification engineClassification label: mal100.evad.winEXE@3/6@1/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3204:120:WilError_03
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5336
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5236fb9a-d0b1-4281-a181-6268300dbfedJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeReversingLabs: Detection: 50%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe"
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5336 -s 708
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSection loaded: dpapi.dllJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic file information: File size 5829632 > 1048576
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x58ec00
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: h.pdB source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287495221.00007FF75CB78000.00000020.00000001.01000000.00000003.sdmp
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: section name: .vmp0
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeStatic PE information: section name: .vmp1

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeMemory written: PID: 5336 base: 7FFDB4590008 value: E9 EB D9 E9 FF Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeMemory written: PID: 5336 base: 7FFDB442D9F0 value: E9 20 26 16 00 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeMemory written: PID: 5336 base: 7FFDB45A000D value: E9 BB CB EB FF Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeMemory written: PID: 5336 base: 7FFDB445CBC0 value: E9 5A 34 14 00 Jump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCESSHACKER.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: X64DBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: REGMON.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHSTRING TOO LONGBAD CAST*CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEDLLK=MX
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WINDBG.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FIDDLER.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287255645.00007FF75CAB1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.00000241270B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXEZ
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WIRESHARK.EXE
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FILEMON.EXE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeRDTSC instruction interceptor: First address: 7FF75D43CFED second address: 7FF75D43D011 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebx 0x00000004 cdq 0x00000005 inc ecx 0x00000006 pop ecx 0x00000007 inc cx 0x00000009 movzx esi, dl 0x0000000c lahf 0x0000000d inc ecx 0x0000000e pop esi 0x0000000f cwd 0x00000011 dec esp 0x00000012 movzx edx, bp 0x00000015 inc cx 0x00000017 bswap eax 0x00000019 pop ebx 0x0000001a pop esi 0x0000001b dec eax 0x0000001c cwde 0x0000001d lahf 0x0000001e inc sp 0x00000020 movzx eax, bl 0x00000023 pop edi 0x00000024 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeRDTSC instruction interceptor: First address: 7FF75CD9C4BF second address: 7FF75CD82B8D instructions: 0x00000000 rdtsc 0x00000002 shr cl, cl 0x00000004 stc 0x00000005 or ch, FFFFFF8Bh 0x00000008 dec eax 0x00000009 sub edi, 00000008h 0x0000000f dec esp 0x00000010 btc ecx, ebx 0x00000013 mov dword ptr [edi], edx 0x00000015 inc ebp 0x00000016 test bl, ch 0x00000018 mov dword ptr [edi+04h], eax 0x0000001b rcr ch, FFFFFFB6h 0x0000001e inc ecx 0x0000001f mov cl, dh 0x00000021 dec ecx 0x00000022 sub ebx, 00000004h 0x00000028 btc ecx, 6Dh 0x0000002c dec eax 0x0000002d arpl bx, cx 0x0000002f dec eax 0x00000030 test ecx, 72FC55E8h 0x00000036 inc ecx 0x00000037 mov ecx, dword ptr [ebx] 0x00000039 stc 0x0000003a inc ecx 0x0000003b xor ecx, edx 0x0000003d jmp 00007F67FC742EF5h 0x00000042 not ecx 0x00000044 jmp 00007F67FC7731C7h 0x00000049 dec ecx 0x0000004b inc esp 0x0000004c test dl, bl 0x0000004e neg ecx 0x00000050 test bh, FFFFFFBEh 0x00000053 xor ecx, 24EA638Bh 0x00000059 inc ecx 0x0000005a push edx 0x0000005b inc ecx 0x0000005c ror dl, FFFFFFDAh 0x0000005f inc ecx 0x00000060 sub edx, 2A2F4E5Ch 0x00000066 dec ecx 0x00000067 rcl edx, FFFFFFE5h 0x0000006a xor dword ptr [esp], ecx 0x0000006d inc ecx 0x0000006e rcl dl, 00000054h 0x00000071 jmp 00007F67FC7DFD9Eh 0x00000076 inc ecx 0x00000077 pop edx 0x00000078 dec eax 0x00000079 arpl cx, cx 0x0000007b cmp dl, FFFFFFBAh 0x0000007e dec esp 0x0000007f add ecx, ecx 0x00000081 jmp 00007F67FC6E2D11h 0x00000086 jmp 00007F67FC79E906h 0x0000008b dec eax 0x0000008c lea ebp, dword ptr [esp+00000140h] 0x00000093 inc eax 0x00000094 test ch, al 0x00000096 stc 0x00000097 dec eax 0x00000098 cmp edi, ebp 0x0000009a jmp 00007F67FC7F8733h 0x0000009f ja 00007F67FC7CCFF4h 0x000000a5 inc ecx 0x000000a6 push ecx 0x000000a7 ret 0x000000a8 inc esp 0x000000a9 mov eax, dword ptr [edi] 0x000000ab rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeRDTSC instruction interceptor: First address: 7FF75CDE8F2E second address: 7FF75CDE8F52 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop ebx 0x00000004 cdq 0x00000005 inc ecx 0x00000006 pop ecx 0x00000007 inc cx 0x00000009 movzx esi, dl 0x0000000c lahf 0x0000000d inc ecx 0x0000000e pop esi 0x0000000f cwd 0x00000011 dec esp 0x00000012 movzx edx, bp 0x00000015 inc cx 0x00000017 bswap eax 0x00000019 pop ebx 0x0000001a pop esi 0x0000001b dec eax 0x0000001c cwde 0x0000001d lahf 0x0000001e inc sp 0x00000020 movzx eax, bl 0x00000023 pop edi 0x00000024 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSpecial instruction interceptor: First address: 7FF75D2FA9C3 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSpecial instruction interceptor: First address: 7FF75D2FA9DB instructions rdtsc caused by: RDTSC with Trap Flag (TF)
    Source: Amcache.hve.5.drBinary or memory string: VMware
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWm
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeHandle closed: DEADC0DE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeProcess queried: DebugObjectHandleJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe PID: 5336, type: MEMORYSTR
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeNtProtectVirtualMemory: Indirect: 0x7FF75CEB3216Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287106707.00000241270B5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.00000241270B5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
    Source: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    11
    Virtualization/Sandbox Evasion
    1
    Credential API Hooking
    521
    Security Software Discovery
    Remote Services1
    Credential API Hooking
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Abuse Elevation Control Mechanism
    1
    Process Injection
    LSASS Memory11
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Abuse Elevation Control Mechanism
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS23
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe50%ReversingLabsWin64.Trojan.Generic
    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe100%AviraHEUR/AGEN.1315472
    SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    keyauth.win
    104.26.1.5
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://keyauth.win/false
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://keyauth.win:443/berNovemberDecemberAMPMMM/dd/yyddddSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://185.101.104.122/scbronkz09.dllC:SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpfalse
            unknown
            https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://keyauth.win:443/ySecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287027376.000002412708C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241038335.000002412708C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  https://keyauth.win/api/1.2/L=jXSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://keyauth.win/ptemberSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286953051.0000024127062000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000003.2241143427.0000024127062000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://upx.sf.netAmcache.hve.5.drfalse
                      • URL Reputation: safe
                      unknown
                      http://185.101.104.122/scbronkz09.dllSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpfalse
                        unknown
                        https://keyauth.win/7-vYSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287295624.00007FF75CB1F000.00000002.00000001.01000000.00000003.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2286864561.000002412702A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, 00000001.00000002.2287316107.00007FF75CB3B000.00000004.00000001.01000000.00000003.sdmpfalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.26.1.5
                            keyauth.winUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1538285
                            Start date and time:2024-10-20 23:36:00 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 29s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                            Detection:MAL
                            Classification:mal100.evad.winEXE@3/6@1/1
                            EGA Information:Failed
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 93.184.221.240, 52.168.117.173
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, blobcollector.events.data.trafficmanager.net, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
                            • Execution Graph export aborted for target SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe, PID 5336 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                            TimeTypeDescription
                            17:37:01API Interceptor1x Sleep call for process: SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe modified
                            17:37:06API Interceptor1x Sleep call for process: WerFault.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.26.1.5SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                    lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                      oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                              4.7.exeGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                keyauth.winSecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUSSecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                No context
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.0066294810865353
                                                Encrypted:false
                                                SSDEEP:96:MxvF9H2J8iG7ydsA9hqFGhiXSKQXIDcQjc6rUcEtcw3n9z+HbHg/8BRTf3cUpweU:gn01GWdEQ09MXijUJFzzuiFeZ24lO8U
                                                MD5:E1ABB44BDD1B6706F740B8E6DBE070F5
                                                SHA1:99E2C8E7E7D98ACB2505A8575E32858A787D5A14
                                                SHA-256:2162330CB7B03A624E0A3ED59C34CEE6E358E2C0DB6C3664F694729458355509
                                                SHA-512:7C4AFB00514D4D6BF2A36666ACB36CBA509DB4C98D865CCFEEFA1D1FB457F240D372B0E32064713FA48BA0CE4C48A993D5CAD241A54CC395EC353517CD4244C9
                                                Malicious:false
                                                Reputation:low
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.3.8.2.2.8.4.2.0.9.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.3.8.2.3.7.7.9.6.0.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.d.3.d.7.d.8.-.3.9.c.2.-.4.e.e.b.-.8.2.e.f.-.e.3.b.b.6.8.f.f.7.4.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.7.b.2.3.e.c.0.-.c.0.a.2.-.4.2.d.4.-.a.6.3.5.-.1.a.2.3.1.c.a.f.b.5.1.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...E.v.o.-.g.e.n...6.0.3.0...2.9.5.0.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.d.8.-.0.0.0.1.-.0.0.1.5.-.7.2.9.a.-.6.b.3.1.3.8.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.c.d.6.6.4.c.b.7.f.d.f.f.6.5.e.0.f.d.7.6.9.c.1.d.3.d.c.c.5.3.9.0.0.0.0.f.f.f.f.!.0.0.0.0.e.a.2.6.b.c.3.3.3.4.6.a.f.2.e.c.4.b.5.f.8.f.b.0.6.7.1.f.5.e.b.1.4.b.6.f.3.1.c.3.!.S.e.c.u.r.i.t.e.I.n.f.o...
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:37:03 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):229054
                                                Entropy (8bit):1.332979855914027
                                                Encrypted:false
                                                SSDEEP:384:e3fg/Yg4rIKtBdO4mq/SR9atCaUHV4vQ9m3ZPBYRYNqfMYVVLklEVBEMXWDm4e5s:evNgjKtBZtpYRqA4EVwER/oiAZV
                                                MD5:E977472B2BA9466EE0A5688C742CF722
                                                SHA1:B1F414CBB13F09628CF15A5E436651761E091684
                                                SHA-256:41F0F8CC1EA05DFEA212860F2401C52F85DC9CDCC1653C83D66A47FECB950504
                                                SHA-512:766BFB5ED14684A037A7D3543993CB8C722E4B640C02A5CC9A8C61F371CAF202BD4D669A75513AD4C7F02A13B8699251E623BC596090290D38B9F9B6C7E409A7
                                                Malicious:false
                                                Reputation:low
                                                Preview:MDMP..a..... ........w.g....................................<.... .......... {..........`.......8...........T........... ;...C..........H ..........4"..............................................................................eJ......."......Lw......................T............w.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8946
                                                Entropy (8bit):3.700510701940768
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJfSiS6Y2DyZcgmfXbJFTppDa89bJwdZkfG+Dm:R6lXJqP6YvCgmfrbjJwdafY
                                                MD5:1409CBD4FAE44C6C0BB989B153926B30
                                                SHA1:F11A89B2180FF11CEDB62A1DBEAE1855C0AF95C3
                                                SHA-256:1AB50CF7A23F6DD6C6529BB432CD770C3481BC0F2C75C5B0BF8A556AD4252885
                                                SHA-512:6EFFBBCAB63D16721A04AA05B4A6D6481A57965CE64A37AB8240024EEC8A83B6AF9527BE5C4E9FDADB02693B6B075F3059B2EAF4A6CEC09E1C1C4449FD0AEC29
                                                Malicious:false
                                                Reputation:low
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.3.6.<./.P.i.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4921
                                                Entropy (8bit):4.51152803284946
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsMJg771I9tqWpW8VYwYm8M4J51fy1fGJsF940yq8v21fGJoE1e+1fS+I:uIjfKI7SL7VgJbCfdWODl2S2S5d
                                                MD5:21ED5AE94873599EC56BB9208306054F
                                                SHA1:EF11E239350724C85357DF4751BC41FBC76B1265
                                                SHA-256:5F552A0BD380CE79858C3C4498E450D4830714CC72FE3B953F7D0F31353C3568
                                                SHA-512:715AE4B790C9C21DBD310A4246E0963CAC9451707F0DDCBDE19817CA2C1E1AD1D465F9121F5D6AF6FCDD9AAFCB0276D10555490E56DC2645CC38E53F5F117364
                                                Malicious:false
                                                Reputation:low
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552279" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.468935493481985
                                                Encrypted:false
                                                SSDEEP:6144:hzZfpi6ceLPx9skLmb0fsZWSP3aJG8nAgeiJRMMhA2zX4WABluuNDjDH5S:5ZHtsZWOKnMM6bFppj4
                                                MD5:89E656D9AF8BA0357510BE0E452EACEB
                                                SHA1:1CE1CD3CA88B30B5DB943F5799A29C666BB12058
                                                SHA-256:F9B5724A7F82DC5103BD6B937ECF1FC3EDC5B3FFE1F71E1C70B4BC6831050D34
                                                SHA-512:30F0874FACA8E67BE0FEACA811F7C00198BCA560CF789C0B750B2A8A52423C3AE28AAAC637F443043E97AD8D62AC6064AA14935053E6E5A1E57FFD2174EDD5D2
                                                Malicious:false
                                                Reputation:low
                                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..38#..............................................................................................................................................................................................................................................................................................................................................x...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):208
                                                Entropy (8bit):2.4305258110308814
                                                Encrypted:false
                                                SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                                MD5:FC51E3860D2A83AD586811F10DFB46C0
                                                SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                                SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                                SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                                Malicious:false
                                                Reputation:low
                                                Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                                File type:PE32+ executable (console) x86-64, for MS Windows
                                                Entropy (8bit):7.912372742183285
                                                TrID:
                                                • Win64 Executable Console (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                                                File size:5'829'632 bytes
                                                MD5:18806c401f2e1cfd826d24d79dd62e13
                                                SHA1:ea26bc33346af2ec4b5f8fb0671f5eb14b6f31c3
                                                SHA256:585524cf95f35c1581c0de8ed8ab1a5ef35b0bc4b50d90b25f1af20b97058897
                                                SHA512:fd0bb1954ec29595db2b2beafba1ccfc66253ef822a94356a0ca9b97f4147f9ad4e2e21147f2d6615d057abad64201931c3289f193a802a50f0161ed341d00fc
                                                SSDEEP:98304:onlCIPonim4gHDFjfWq1O90KIeCHpAgYsCEhyDq58jM+ETyqsy1UBZhb+/OyJnR:sgnT439j3gYsCeeq58jrdxyOvbmD
                                                TLSH:A34612BE6158339CC41FC8345027FD09B2F6163E06F499E971CBBBD06BAB415AB06B16
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."....&.....&........}........@..........................................`................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x1407df39e
                                                Entrypoint Section:.vmp1
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows cui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x66F6A4DC [Fri Sep 27 12:28:12 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:c9826fadc3dac0724a66f56b1b1a02ba
                                                Instruction
                                                push A0B8296Bh
                                                call 00007F67FCEFE568h
                                                push ds
                                                salc
                                                adc ecx, dword ptr [eax-22CCA609h]
                                                aaa
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x7937780xc4f.vmp1
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x7214780x26c.vmp1
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x99f0000x1e0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9962b00x7890.vmp1
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x99e0000xb4.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x76f7000x30.vmp1
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9961700x140.vmp1
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x7200000x240.vmp1
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x6d1500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x6f0000x1b8720x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x8b0000x17000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x8d0000x4b300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .vmp00x920000x37c02d0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .vmp10x40f0000x58eb400x58ec004c1ee0c90faa7d30fdd74756aba402d8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .reloc0x99e0000xb40x200f66e4925474c708efb0ea44552cf9f37False0.30859375GLS_BINARY_LSB_FIRST1.8636891888673253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x99f0000x1e00x200fb5c518e4a39826d20fa4aca7de33714False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0x99f0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                DLLImport
                                                KERNEL32.dllGetProcessHeap
                                                USER32.dllGetWindowLongPtrW
                                                MSVCP140.dll??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
                                                WINHTTP.dllWinHttpOpen
                                                CRYPT32.dllCertOpenStore
                                                Normaliz.dllIdnToAscii
                                                WLDAP32.dll
                                                WS2_32.dllsocket
                                                RPCRT4.dllUuidCreate
                                                PSAPI.DLLGetModuleInformation
                                                USERENV.dllUnloadUserProfile
                                                VCRUNTIME140_1.dll__CxxFrameHandler4
                                                VCRUNTIME140.dll__C_specific_handler
                                                api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo
                                                api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf
                                                api-ms-win-crt-heap-l1-1-0.dllfree
                                                api-ms-win-crt-utility-l1-1-0.dllqsort
                                                api-ms-win-crt-string-l1-1-0.dllstrncmp
                                                api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file
                                                api-ms-win-crt-time-l1-1-0.dll_time64
                                                api-ms-win-crt-convert-l1-1-0.dllatoi
                                                api-ms-win-crt-locale-l1-1-0.dlllocaleconv
                                                api-ms-win-crt-math-l1-1-0.dll_dclass
                                                ADVAPI32.dllCryptReleaseContext
                                                SHELL32.dllShellExecuteA
                                                WTSAPI32.dllWTSSendMessageW
                                                KERNEL32.dllGetSystemTimeAsFileTime
                                                USER32.dllGetUserObjectInformationW
                                                KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 23:37:02.641851902 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:02.641911030 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:02.641977072 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:02.644490957 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:02.644509077 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.222227097 CEST49734443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.222291946 CEST44349734104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.222368956 CEST49734443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.222778082 CEST49734443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.222793102 CEST44349734104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.397722960 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.397788048 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.399525881 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.399539948 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.399826050 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.448882103 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.484920979 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.527395964 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655457020 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655489922 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655522108 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655550003 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.655563116 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655601978 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.655608892 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655627966 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655664921 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.655670881 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655873060 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655894995 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655910969 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.655919075 CEST44349728104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.655955076 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.658124924 CEST49728443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:03.987962008 CEST44349734104.26.1.5192.168.2.6
                                                Oct 20, 2024 23:37:03.988063097 CEST49734443192.168.2.6104.26.1.5
                                                Oct 20, 2024 23:37:08.383024931 CEST49734443192.168.2.6104.26.1.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 23:37:02.624818087 CEST5613953192.168.2.61.1.1.1
                                                Oct 20, 2024 23:37:02.633549929 CEST53561391.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 20, 2024 23:37:02.624818087 CEST192.168.2.61.1.1.10xb0afStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 20, 2024 23:37:02.633549929 CEST1.1.1.1192.168.2.60xb0afNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                Oct 20, 2024 23:37:02.633549929 CEST1.1.1.1192.168.2.60xb0afNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                Oct 20, 2024 23:37:02.633549929 CEST1.1.1.1192.168.2.60xb0afNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                • keyauth.win
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649728104.26.1.54435336C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-20 21:37:03 UTC95OUTGET / HTTP/1.1
                                                Connection: Keep-Alive
                                                User-Agent: CPlusPlusExample/1.0
                                                Host: keyauth.win
                                                2024-10-20 21:37:03 UTC1126INHTTP/1.1 200 OK
                                                Date: Sun, 20 Oct 2024 21:37:03 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                                Cache-Control: max-age=14400
                                                CF-Cache-Status: HIT
                                                Age: 387
                                                Accept-Ranges: bytes
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Yy4%2FiekuSjtqVSJwvF%2Banp8wZOxn2ryv8v87rK14WJyqvBcnygTolPqKAql27FE4xGldx6Hb09tPT3FGE78%2BfaTUXzaCyMkScxzOGZLX2sUSVr2Ft1gwUXZokKjC"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Acknowledge: Credit to VaultCord.com
                                                X-Powered-By: VaultCord.com
                                                content-security-policy: upgrade-insecure-requests
                                                permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                                referrer-policy: strict-origin-when-cross-origin
                                                strict-transport-security: max-age=31536000; includeSubDomains
                                                x-content-security-policy: img-src *; media-src * data:;
                                                x-content-type-options: nosniff
                                                x-frame-options: DENY
                                                x-xss-protection: 1; mode=block
                                                Server: cloudflare
                                                CF-RAY: 8d5c259d4f092b68-LAX
                                                2024-10-20 21:37:03 UTC243INData Raw: 37 39 66 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d 20 4f
                                                Data Ascii: 79ff<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth - O
                                                2024-10-20 21:37:03 UTC1369INData Raw: 70 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20
                                                Data Ascii: pen Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author"
                                                2024-10-20 21:37:03 UTC1369INData Raw: 0a 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f
                                                Data Ascii: <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title" co
                                                2024-10-20 21:37:03 UTC1369INData Raw: 74 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f 73 65
                                                Data Ascii: tent="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Close
                                                2024-10-20 21:37:03 UTC1369INData Raw: 6f 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d 6c 67
                                                Data Ascii: opacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-lg
                                                2024-10-20 21:37:03 UTC1369INData Raw: 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20 34 2e
                                                Data Ascii: lns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.
                                                2024-10-20 21:37:03 UTC1369INData Raw: 65 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72 64 65
                                                Data Ascii: es</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium borde
                                                2024-10-20 21:37:03 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61
                                                Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div cla
                                                2024-10-20 21:37:03 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:1
                                                Start time:17:36:59
                                                Start date:20/10/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Evo-gen.6030.29502.exe"
                                                Imagebase:0x7ff75cab0000
                                                File size:5'829'632 bytes
                                                MD5 hash:18806C401F2E1CFD826D24D79DD62E13
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:17:36:59
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:17:37:02
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 5336 -s 708
                                                Imagebase:0x7ff677790000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                No disassembly