Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
Analysis ID:1538293
MD5:aa9523b95bc34170cfc2e8d618486389
SHA1:7a73553ffde3653c2a59bb90170291bf06499180
SHA256:52bed0a4e8b6690f0365fd2ada184c7ab3a37bc3ab0ff8354a9f9409103d208c
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe (PID: 3048 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe" MD5: AA9523B95BC34170CFC2E8D618486389)
    • conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 4824 cmdline: C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c19741ee-6
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226412923.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2178399949.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/$
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/;dlm/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/C
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/o
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49718 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564
Source: classification engineClassification label: mal96.evad.winEXE@3/6@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4208:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3048
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7958dfb0-6b39-492d-9c9c-712b478cd75bJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dpapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic file information: File size 6471168 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62b600
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 3048 base: 7FFDB4590008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 3048 base: 7FFDB442D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 3048 base: 7FFDB45A000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 3048 base: 7FFDB445CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226412923.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE$
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226741130.00007FF6AC991000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FILEMON.EXE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6AD444B94 second address: 7FF6AD444BAD instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6AD4B644B second address: 7FF6AD4B6460 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cwde 0x00000004 pop ebp 0x00000005 movsx ebx, sp 0x00000008 inc sp 0x0000000a movsx ebx, ah 0x0000000d cwde 0x0000000e pop ecx 0x0000000f inc sp 0x00000011 cmovbe eax, edi 0x00000014 pop edi 0x00000015 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6AD4B6460 second address: 7FF6AD4B6467 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movsx eax, cx 0x00000006 pop esi 0x00000007 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6ACECF329 second address: 7FF6ACECF342 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6ACE9F19D second address: 7FF6ACE9F1B0 instructions: 0x00000000 rdtsc 0x00000002 pop ecx 0x00000003 cbw 0x00000005 pop edi 0x00000006 cwd 0x00000008 dec esp 0x00000009 movsx esp, dx 0x0000000c inc ecx 0x0000000d movzx eax, dx 0x00000010 pop esi 0x00000011 inc ecx 0x00000012 pop edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF6ACE9F1B0 second address: 7FF6ACE9F1B4 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSpecial instruction interceptor: First address: 7FF6AD3B3A90 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSpecial instruction interceptor: First address: 7FF6AD3B3AA8 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeNtProtectVirtualMemory: Indirect: 0x7FF6ACED8971Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe34%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
172.67.72.57
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpfalse
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3EA2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpfalse
              unknown
              https://keyauth.win/api/1.2/CSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://rsms.me/ThisSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  https://keyauth.win/$SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2178399949.0000015CF3E76000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://keyauth.win/oSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226265203.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2177935445.0000015CF3E8F000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://upx.sf.netAmcache.hve.7.drfalse
                      • URL Reputation: safe
                      unknown
                      https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226830538.00007FF6ACAB5000.00000002.00000001.01000000.00000003.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E1C000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226865436.00007FF6ACB00000.00000004.00000001.01000000.00000003.sdmpfalse
                          unknown
                          https://keyauth.win/;dlm/SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2226138648.0000015CF3E3F000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            172.67.72.57
                            keyauth.winUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1538293
                            Start date and time:2024-10-20 23:40:25 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 48s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                            Detection:MAL
                            Classification:mal96.evad.winEXE@3/6@1/1
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.189.173.20
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                            TimeTypeDescription
                            17:41:20API Interceptor1x Sleep call for process: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe modified
                            17:41:25API Interceptor1x Sleep call for process: WerFault.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            172.67.72.57SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                    lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                      flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                              fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                keyauth.winSecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUSSecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 172.67.206.204
                                                SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                No context
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.0454097380130718
                                                Encrypted:false
                                                SSDEEP:192:BxafiHyow2n0OVplpMwj/hJNzuiFQZ24lO8DDc:nafcyow20OVplpMwjtzuiFQY4lO8DDc
                                                MD5:77F109730522BEAE8A117AEBF5E4A118
                                                SHA1:CA332E64B5684249B2BBF44BDFD6F64711A8D7B4
                                                SHA-256:D0B0B2C5F294ECA2B36B42FAEF5278CC3B20E3EE183A9D517D5A09921BC8FCEA
                                                SHA-512:84DF71294537471CB682EFBB5C8D4C1D1AD5652E844E2E0BBFFAF3DB646CC710C5541731FB84183A8BCBDB98F29A4BDA46191D2AE439034B984D24BDA5CC31B4
                                                Malicious:false
                                                Reputation:low
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.4.0.8.1.2.7.9.0.4.9.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.4.0.8.2.2.0.0.9.1.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.8.c.6.0.f.b.-.c.c.8.4.-.4.f.0.2.-.9.b.1.a.-.6.6.5.d.1.5.0.c.9.d.a.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.3.7.c.2.f.9.9.-.c.6.e.3.-.4.6.1.0.-.b.1.d.8.-.6.1.c.b.4.b.8.f.2.2.e.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...3.1.6.6.3...1.0.8.1.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.e.8.-.0.0.0.1.-.0.0.1.5.-.6.6.1.0.-.3.7.c.b.3.8.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.8.4.4.4.c.d.7.7.3.6.0.4.d.2.4.4.1.b.e.5.a.e.3.b.b.a.a.9.6.e.d.0.0.0.0.f.f.f.f.!.0.0.0.0.7.a.7.3.5.5.3.f.f.d.e.3.6.5.3.c.2.a.5.9.b.b.9.0.1.7.0.2.9.1.b.f.0.6.4.9.9.1.8.0.!.S.e.c.u.r.i.t.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:41:21 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):241804
                                                Entropy (8bit):1.3229293116999357
                                                Encrypted:false
                                                SSDEEP:768:Sk+s8+/9BEOFctKwPdcFZeUwgEc+zzL9a+LIC0v:Skb/QOFctKwarn+3L9a1fv
                                                MD5:9A81A0E8C220B1F361A1386C8EEA861C
                                                SHA1:E3D72BEBAF6D1355C65FE280A15F0A672E0420D7
                                                SHA-256:2A018743E086A380BE0D89E76FDD54E4C3B181BC2DF64B8585FD28FC94B72E9B
                                                SHA-512:91A9B562B235D2D560E57E5945343CB3DE323A864654303D39D76EEE12C555C00E682A89F3DD58C3282F88018132963EB45E72012CE879C73AC59AD95CE6FE15
                                                Malicious:false
                                                Reputation:low
                                                Preview:MDMP..a..... ........y.g............4...............H.......$...X"......................`.......8...........T...........`<..,t..........|"..........h$..............................................................................eJ.......%......Lw......................T............x.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8970
                                                Entropy (8bit):3.6969495726027017
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJKfQU6Y2DEsAwHFgmfxrJFIqpDG89bwVMf0KQm:R6lXJKYU6Y5kHFgmfxrbI4wOfF
                                                MD5:16558E8D7C330326F44C7984B0301FCA
                                                SHA1:D0756BE19B7E12DBA2DA3A700BF18EB2C8608831
                                                SHA-256:12191DE92F66000705532A714DF700D621F78F25CC2CA3B0E2AF025AE3D8B627
                                                SHA-512:82A716CD6A198D58D2C66F9617260751D9BF1AB66202E776837A0919C3F536ADAD3E02E267A31B824C8DE4402225508F034E73139914E5CFFCAD3CE3D57DB7CA
                                                Malicious:false
                                                Reputation:low
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.4.8.<./.P.i.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4951
                                                Entropy (8bit):4.522370411048079
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsQ/Jg771I9FCWpW8VYXYm8M4J5RcJsFVyq8v2cJAMhSPsPsd:uIjfQhI7WD7VHJpWOMhWQsd
                                                MD5:4B4648D3C233A7888BDA0B9938018089
                                                SHA1:4426E39EB07727F44F80B0507405B1050A45DCEB
                                                SHA-256:4DE8AE5821DC2B1B4F5B54660D46AF861EC16AED000F98E460A60A0C9A45F7BC
                                                SHA-512:D7A6EF46972CE559D8EEAA8F81A882FA49C7A8AF367ADEABA55C5191CB634541CB21BBEDAF00AF6C1495474B8443DDA3AD841350C69330FCD4A63EDBEAB740F6
                                                Malicious:false
                                                Reputation:low
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552284" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.468970805693707
                                                Encrypted:false
                                                SSDEEP:6144:LzZfpi6ceLPx9skLmb0f/ZWSP3aJG8nAgeiJRMMhA2zX4WABluuNfjDH5S:nZHt/ZWOKnMM6bFpVj4
                                                MD5:B5742F6E6803B631EFF548C6E8C55EDD
                                                SHA1:3599F30E8D3DA4790DEDD4CF1D9EAC27AB510FC0
                                                SHA-256:6E27BD20B750AE5B002803830D38A545DCFEC9A98A18D92BFD6CCC983F04C201
                                                SHA-512:4663C0AF626941DEDAC1445766D3CEE30F9F61185346B657326E7F779604FE5BA9EFE7BC06075BA418C58F3B21AC2B9688C9BBBB651461AFDB156FCE761F6A55
                                                Malicious:false
                                                Reputation:low
                                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.}.8#..............................................................................................................................................................................................................................................................................................................................................L.k.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):208
                                                Entropy (8bit):2.4305258110308814
                                                Encrypted:false
                                                SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                                MD5:FC51E3860D2A83AD586811F10DFB46C0
                                                SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                                SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                                SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                                File type:PE32+ executable (console) x86-64, for MS Windows
                                                Entropy (8bit):7.923604952802972
                                                TrID:
                                                • Win64 Executable Console (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                                File size:6'471'168 bytes
                                                MD5:aa9523b95bc34170cfc2e8d618486389
                                                SHA1:7a73553ffde3653c2a59bb90170291bf06499180
                                                SHA256:52bed0a4e8b6690f0365fd2ada184c7ab3a37bc3ab0ff8354a9f9409103d208c
                                                SHA512:a7945ad1ad6e7151671eaefb2152b11af2fffa2c051534073b5cb029085ba47bac30edad1153d6b5700c085356d263f0b7cb552c7e77fd277d611aa62dee1fc6
                                                SSDEEP:196608:BA1jCmcNsAVa9qZ/SKnQ9KEdFL/SCiYTHP7n:Xmc2AcqZ+jdR/SCzD7
                                                TLSH:C05622EBA148378CD41A84B09423F947B1F6971E1EF999DE70CBFBC07B9A815D502B42
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....3.f.........."....&.8...........6e........@.............................0............`................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x140653684
                                                Entrypoint Section:.vmp1
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows cui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x66EE33E8 [Sat Sep 21 02:48:08 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:e52c146e3e628600aa515c087a001413
                                                Instruction
                                                push 08519852h
                                                call 00007F182D43A457h
                                                add byte ptr [eax], al
                                                add dword ptr [eax], eax
                                                add byte ptr [eax], al
                                                jecxz 00007F182CF3D9A8h
                                                inc ebx
                                                fsubr st(1), st(0)
                                                in eax, 6Bh
                                                jl 00007F182CF3DA93h
                                                dec edx
                                                adc eax, 7E617BFFh
                                                dec eax
                                                sub byte ptr [ecx], bl
                                                xchg eax, edx
                                                fld tbyte ptr [ecx]
                                                sti
                                                std
                                                dec edx
                                                movsd
                                                sbb eax, A1A7FBB0h
                                                call far fword ptr [ebp-5A8F1950h]
                                                jecxz 00007F182CF3DA8Ch
                                                pop esp
                                                dec esp
                                                sub eax, 406FEC2Ah
                                                dec edi
                                                sub eax, 9852DB25h
                                                enter CB9Eh, BAh
                                                aam E6h
                                                adc bh, cl
                                                sbb edx, dword ptr [ebp+edi*4-71B699E3h]
                                                cmc
                                                jle 00007F182CF3D9F4h
                                                dec ebx
                                                push cs
                                                mov byte ptr [edi], dh
                                                iretd
                                                in al, 63h
                                                in eax, 41h
                                                adc eax, DF96AA9Ch
                                                in eax, 63h
                                                jnl 00007F182CF3DAA0h
                                                xor dword ptr [edx+7A56A371h], esi
                                                sbb ebx, dword ptr [ecx+edi*8]
                                                fstp tbyte ptr [edx+45h]
                                                mov ss, bp
                                                mov al, 91h
                                                inc esi
                                                mov seg?, di
                                                or ch, byte ptr [ebx+47h]
                                                mov fs, word ptr [8E4748C5h]
                                                lds edi, fword ptr [ebp+44h]
                                                mov cs, word ptr [0E46C986h]
                                                sub byte ptr [edi+1563E9D4h], dh
                                                sar dword ptr [B6AA9C18h], 1
                                                les ebp, eax
                                                arpl bp, sp
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x5f56400xc4f.vmp1
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa1baa00x2bc.vmp1
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb820000x1e0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb706800xfe28.vmp1
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb810000xe0.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x5de6280x30.vmp1
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb705400x140.vmp1
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x58d0000x280.vmp1
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x1237700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x1250000x4ae000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x1700000x56b980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x1c70000xd0c80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .vmp00x1d50000x37f54b0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .vmp10x5550000x62b4a80x62b600af769d4baf55b57f5c139d34c765bcf5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .reloc0xb810000xe00x2008b0e79e8e23270fbce3ebe7e5682bd80False0.3515625GLS_BINARY_LSB_FIRST2.1488592077073276IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0xb820000x1e00x2003b7c0ddc0e50a3edf757279182f52038False0.537109375data4.758721582235538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0xb820580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                DLLImport
                                                d3d11.dllD3D11CreateDeviceAndSwapChain
                                                D3DCOMPILER_47.dllD3DCompile
                                                KERNEL32.dllReadFile
                                                USER32.dllSetCursor
                                                ADVAPI32.dllControlService
                                                MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
                                                dwmapi.dllDwmExtendFrameIntoClientArea
                                                WINHTTP.dllWinHttpSendRequest
                                                CRYPT32.dllCertCreateCertificateChainEngine
                                                IMM32.dllImmReleaseContext
                                                Normaliz.dllIdnToAscii
                                                WLDAP32.dll
                                                WS2_32.dllntohl
                                                RPCRT4.dllRpcStringFreeA
                                                PSAPI.DLLGetModuleInformation
                                                USERENV.dllUnloadUserProfile
                                                VCRUNTIME140_1.dll__CxxFrameHandler4
                                                VCRUNTIME140.dll__current_exception_context
                                                api-ms-win-crt-runtime-l1-1-0.dllexit
                                                api-ms-win-crt-stdio-l1-1-0.dllfgetc
                                                api-ms-win-crt-heap-l1-1-0.dllfree
                                                api-ms-win-crt-math-l1-1-0.dllacosf
                                                api-ms-win-crt-string-l1-1-0.dllstrncmp
                                                api-ms-win-crt-convert-l1-1-0.dllatoi
                                                api-ms-win-crt-utility-l1-1-0.dllqsort
                                                api-ms-win-crt-filesystem-l1-1-0.dll_access
                                                api-ms-win-crt-locale-l1-1-0.dlllocaleconv
                                                api-ms-win-crt-time-l1-1-0.dll_time64
                                                SHELL32.dllShellExecuteA
                                                WTSAPI32.dllWTSSendMessageW
                                                KERNEL32.dllGetSystemTimeAsFileTime
                                                USER32.dllGetUserObjectInformationW
                                                KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 23:41:20.878115892 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:20.878161907 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:20.878249884 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:20.882292032 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:20.882309914 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.664773941 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.664855003 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.670104027 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.670113087 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.670479059 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.725528002 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.748994112 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.753101110 CEST49718443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.753145933 CEST44349718172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.753240108 CEST49718443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.753669977 CEST49718443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.753690004 CEST44349718172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.795397043 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932017088 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932137012 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932240009 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932296991 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.932317019 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932396889 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932447910 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932531118 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932604074 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932682037 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932732105 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.932732105 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.932732105 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.932739973 CEST44349717172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:21.932882071 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:21.935170889 CEST49717443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:22.514249086 CEST44349718172.67.72.57192.168.2.6
                                                Oct 20, 2024 23:41:22.514353991 CEST49718443192.168.2.6172.67.72.57
                                                Oct 20, 2024 23:41:26.923074007 CEST49718443192.168.2.6172.67.72.57
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 23:41:20.843501091 CEST5331253192.168.2.61.1.1.1
                                                Oct 20, 2024 23:41:20.851495981 CEST53533121.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 20, 2024 23:41:20.843501091 CEST192.168.2.61.1.1.10x2e6bStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 20, 2024 23:41:20.851495981 CEST1.1.1.1192.168.2.60x2e6bNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                Oct 20, 2024 23:41:20.851495981 CEST1.1.1.1192.168.2.60x2e6bNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                Oct 20, 2024 23:41:20.851495981 CEST1.1.1.1192.168.2.60x2e6bNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                • keyauth.win
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649717172.67.72.574433048C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-20 21:41:21 UTC95OUTGET / HTTP/1.1
                                                Connection: Keep-Alive
                                                User-Agent: CPlusPlusExample/1.0
                                                Host: keyauth.win
                                                2024-10-20 21:41:21 UTC1122INHTTP/1.1 200 OK
                                                Date: Sun, 20 Oct 2024 21:41:21 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                                Cache-Control: max-age=14400
                                                CF-Cache-Status: HIT
                                                Age: 645
                                                Accept-Ranges: bytes
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ae4I7S2lFGrf2phwEME4H2IOMiohv571eYhS5v57lBk7zvRZWybZciRJF8l8e9EnPnt%2BmVEFdNMTpCIHZUcCG6DfqF22Mo98KcLJ48AKAsc1rbEr6CILSSEShFbR"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Acknowledge: Credit to VaultCord.com
                                                X-Powered-By: VaultCord.com
                                                content-security-policy: upgrade-insecure-requests
                                                permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                                referrer-policy: strict-origin-when-cross-origin
                                                strict-transport-security: max-age=31536000; includeSubDomains
                                                x-content-security-policy: img-src *; media-src * data:;
                                                x-content-type-options: nosniff
                                                x-frame-options: DENY
                                                x-xss-protection: 1; mode=block
                                                Server: cloudflare
                                                CF-RAY: 8d5c2beb780f2f50-LAX
                                                2024-10-20 21:41:21 UTC247INData Raw: 37 62 33 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d 20 4f 70 65 6e 20
                                                Data Ascii: 7b3c<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth - Open
                                                2024-10-20 21:41:21 UTC1369INData Raw: 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 2f 3e 0a 20
                                                Data Ascii: Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author" />
                                                2024-10-20 21:41:21 UTC1369INData Raw: 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e
                                                Data Ascii: <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title" conten
                                                2024-10-20 21:41:21 UTC1369INData Raw: 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f 73 65 22 3e 0a 20
                                                Data Ascii: ="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Close">
                                                2024-10-20 21:41:21 UTC1369INData Raw: 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d 6c 67 20 74 65 78
                                                Data Ascii: ity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-lg tex
                                                2024-10-20 21:41:21 UTC1369INData Raw: 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20 34 2e 32 39 33 61
                                                Data Ascii: "http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.293a
                                                2024-10-20 21:41:21 UTC1369INData Raw: 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72 64 65 72 2d 62 20
                                                Data Ascii: a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium border-b
                                                2024-10-20 21:41:21 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22
                                                Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div class="
                                                2024-10-20 21:41:21 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:17:41:17
                                                Start date:20/10/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe"
                                                Imagebase:0x7ff6ac990000
                                                File size:6'471'168 bytes
                                                MD5 hash:AA9523B95BC34170CFC2E8D618486389
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:17:41:17
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:17:41:20
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 3048 -s 1564
                                                Imagebase:0x7ff637340000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                No disassembly