Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
Analysis ID:1538293
MD5:aa9523b95bc34170cfc2e8d618486389
SHA1:7a73553ffde3653c2a59bb90170291bf06499180
SHA256:52bed0a4e8b6690f0365fd2ada184c7ab3a37bc3ab0ff8354a9f9409103d208c
Tags:exe
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe (PID: 5128 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe" MD5: AA9523B95BC34170CFC2E8D618486389)
    • conhost.exe (PID: 5916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5812 cmdline: C:\Windows\system32\WerFault.exe -u -p 5128 -s 1524 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 1012 cmdline: C:\Windows\system32\WerFault.exe -u -p 5128 -s 1540 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_574ed994-3
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515651291.00000173D9730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515589276.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169401415.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/valorant
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515589276.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169401415.00000173D96E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.6:49714 version: TLS 1.2

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5128 -s 1524
Source: classification engineClassification label: mal96.evad.winEXE@4/10@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5916:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5128
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e80fe0e3-becd-42b2-8336-d4ad5b06b385Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5128 -s 1524
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5128 -s 1540
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSection loaded: dpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic file information: File size 6471168 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x62b600
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeStatic PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 5128 base: 7FFDB4590008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 5128 base: 7FFDB442D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 5128 base: 7FFDB45A000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeMemory written: PID: 5128 base: 7FFDB445CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEI
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12PRIVATE STOREIMGUIAIMBOTMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTMISCMISC SETTINGSCOLOR PICKERMEDALOVERLAYMEDALOVERLAYCLASS [V4L0R4NT A1MB0T]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATuser-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT user.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515928317.00007FF7470B1000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF747B64B94 second address: 7FF747B64BAD instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF747BD644B second address: 7FF747BD6460 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 cwde 0x00000004 pop ebp 0x00000005 movsx ebx, sp 0x00000008 inc sp 0x0000000a movsx ebx, ah 0x0000000d cwde 0x0000000e pop ecx 0x0000000f inc sp 0x00000011 cmovbe eax, edi 0x00000014 pop edi 0x00000015 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF747BD6460 second address: 7FF747BD6467 instructions: 0x00000000 rdtsc 0x00000002 inc ebp 0x00000003 movsx eax, cx 0x00000006 pop esi 0x00000007 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF7475EF329 second address: 7FF7475EF342 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 dec ecx 0x00000005 shl eax, FFFFFFB2h 0x00000008 dec eax 0x00000009 movzx esi, bx 0x0000000c inc ecx 0x0000000d pop esi 0x0000000e inc ecx 0x0000000f pop edx 0x00000010 inc ecx 0x00000011 or cl, 00000071h 0x00000014 stc 0x00000015 pop esi 0x00000016 inc ecx 0x00000017 pop esp 0x00000018 pop edi 0x00000019 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF7475BF19D second address: 7FF7475BF1B0 instructions: 0x00000000 rdtsc 0x00000002 pop ecx 0x00000003 cbw 0x00000005 pop edi 0x00000006 cwd 0x00000008 dec esp 0x00000009 movsx esp, dx 0x0000000c inc ecx 0x0000000d movzx eax, dx 0x00000010 pop esi 0x00000011 inc ecx 0x00000012 pop edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeRDTSC instruction interceptor: First address: 7FF7475BF1B0 second address: 7FF7475BF1B4 instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop esp 0x00000004 rdtsc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSpecial instruction interceptor: First address: 7FF747AD3A90 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSpecial instruction interceptor: First address: 7FF747AD3AA8 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169227126.00000173D9730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515651291.00000173D9730000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeNtProtectVirtualMemory: Indirect: 0x7FF7475F8971Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D96C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS23
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe34%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe100%AviraHEUR/AGEN.1315472
SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
172.67.72.57
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpfalse
        unknown
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515651291.00000173D9730000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515589276.00000173D96E3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000003.2169401415.00000173D96E3000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://keyauth.win/api/1.2/valorantSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpfalse
              unknown
              https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516042248.00007FF7471D5000.00000002.00000001.01000000.00000003.sdmpfalse
              • URL Reputation: safe
              unknown
              https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2515454002.00000173D969C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpfalse
                unknown
                https://rsms.me/ThisSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpfalse
                  unknown
                  http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe, 00000000.00000002.2516710597.00007FF747220000.00000004.00000001.01000000.00000003.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.72.57
                    keyauth.winUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1538293
                    Start date and time:2024-10-20 23:45:47 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 50s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                    Detection:MAL
                    Classification:mal96.evad.winEXE@4/10@1/1
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.189.173.22
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, www.msftconnecttest.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    172.67.72.57SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                  flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                    Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      keyauth.winSecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSSecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.206.204
                                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.16492.21964.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.72.57
                                      No context
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):1.0456813362805228
                                      Encrypted:false
                                      SSDEEP:192:A6qiHy6Zw2n0OVplpMwjo0JNzuiFPZ24lO8DDc:fqcycw20OVplpMwj1zuiFPY4lO8DDc
                                      MD5:D3CA332E4F6A5838C27DBA20C24D789B
                                      SHA1:2F8FACBE31699FC651ED5BE9FEFB16DFB532C1BA
                                      SHA-256:FC4698509F9342AC776F3DB134F8CDB0E8266A90AD12404A44E3CC1CD245758A
                                      SHA-512:BD76C276CC6AFD05ED0462BEEF61D8841D54513400AE10EEA6968948E1A035310D978F5D01C898F943DDB4242CEBE605F9DF2FEA0898E5C98CEA0074CCA14497
                                      Malicious:false
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.4.4.0.2.8.8.7.2.5.1.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.4.4.0.3.8.4.0.3.6.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.d.f.d.b.3.b.-.f.8.6.d.-.4.b.3.0.-.9.c.4.d.-.7.a.7.0.6.1.c.3.c.9.4.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.f.b.1.b.3.6.-.2.1.f.a.-.4.2.c.b.-.8.4.9.1.-.0.5.c.0.8.8.c.d.9.8.3.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...3.1.6.6.3...1.0.8.1.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.0.8.-.0.0.0.1.-.0.0.1.5.-.8.d.a.5.-.1.1.8.b.3.9.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.8.4.4.4.c.d.7.7.3.6.0.4.d.2.4.4.1.b.e.5.a.e.3.b.b.a.a.9.6.e.d.0.0.0.0.f.f.f.f.!.0.0.0.0.7.a.7.3.5.5.3.f.f.d.e.3.6.5.3.c.2.a.5.9.b.b.9.0.1.7.0.2.9.1.b.f.0.6.4.9.9.1.8.0.!.S.e.c.u.r.i.t.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):0.6331817941998713
                                      Encrypted:false
                                      SSDEEP:192:0KUUqiHy6Zw2W+T0WbkFrzuiFvZ24lO8EDc:FUUqcycw2W+AWbkFrzuiFvY4lO8EDc
                                      MD5:D6E1628EAC6FBE0C1C093DDDB25D30B5
                                      SHA1:853C31666AA8F6367E41FDDACE798CE27FF24CE3
                                      SHA-256:DB14C0A965792F1B6155B5854F2CAADAF62D8B187B5B00D055BFDCB6B6D2CA1E
                                      SHA-512:413FB28D2ED05D59E714CB24AFA2B513D469A430E575546B6418D78E3F1E92BE2EDC15B745E0407C9445B06A9272A5EECFFCA484DBCD053BAF5901FE343B79DB
                                      Malicious:false
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.4.4.3.7.4.9.6.1.3.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.4.4.3.7.7.6.1.7.5.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.5.6.6.6.4.3.b.-.2.7.9.2.-.4.c.f.9.-.b.f.f.6.-.2.b.9.8.7.c.4.5.b.4.0.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.b.1.c.4.0.1.-.5.5.8.8.-.4.3.f.f.-.8.8.3.0.-.a.7.b.d.1.e.6.7.9.1.3.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...3.1.6.6.3...1.0.8.1.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.0.8.-.0.0.0.1.-.0.0.1.5.-.8.d.a.5.-.1.1.8.b.3.9.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.8.4.4.4.c.d.7.7.3.6.0.4.d.2.4.4.1.b.e.5.a.e.3.b.b.a.a.9.6.e.d.0.0.0.0.f.f.f.f.!.0.0.0.0.7.a.7.3.5.5.3.f.f.d.e.3.6.5.3.c.2.a.5.9.b.b.9.0.1.7.0.2.9.1.b.f.0.6.4.9.9.1.8.0.!.S.e.c.u.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8868
                                      Entropy (8bit):3.690290217668062
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJMxIQ6Y2Dci+pgmfu9KXprY89bD4/flBm:R6lXJlQ6YBiwgmfu9KPDQfq
                                      MD5:A6D343C0E42A21AE6D150D8BB8F306C2
                                      SHA1:D90564FEE77EC751699D8F7E5390227BD32A3733
                                      SHA-256:71416D48FAC1D20EEF557279987A3B5AF8DEF4710B476125DAD2A91378215E2D
                                      SHA-512:F2885C664EC02D497CA4AADDB196BB22FECE5D7F8C6B510C3219DB1660F86018505D7F2AD3818F232E8BD2B48498D4A81FD779D879461F9537239EF92E8E990C
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.2.8.<./.P.i.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4896
                                      Entropy (8bit):4.558965703569694
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zsQEJg771I9ClWpW8VYTPYm8M4J5Rc8vF7M3yq85d1NXSPsPwd:uIjfQCI7BU7V2SJU38WQwd
                                      MD5:AE000EE6B455B0960CE9F173936D0DBB
                                      SHA1:BB274B9144325383F3D3FAE262EB12FE73CCC1E0
                                      SHA-256:36B43A169B2A301CA99EB7AAB25B1235FA46F83098FC85F6FA018E882AD1DD01
                                      SHA-512:D6A49D2CDFFA9B686E64FC1CE08223EDF2675D560549EF503F6FE3A4EB262970D9F462CF3EA7F35136019B3744B9A1A13E9534337CEFF9FDA122BE66F57EB987
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552289" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:46:43 2024, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):202118
                                      Entropy (8bit):1.3754512641172147
                                      Encrypted:false
                                      SSDEEP:384:XTq07Ie9Nsvl2/BrfnG+zOqkiRa05pr+GOUKjX6ner4tKjZDwcp:XZpNql2/B7OB0tMsM
                                      MD5:AA281EE8BB1898310C6C199DFFA0FD09
                                      SHA1:59F5BEA2D22FB19990971018EA90F85A8C506CF7
                                      SHA-256:EB81FE12FBF94AC5B8D0081FED50335DC66D8A7DA656565FB8EE099B3BF3FDBD
                                      SHA-512:2D8345E30B2CAE7AD38A9D866E61CAFA9DDA320741B1AF14C0CDF51640D5CF3251D97C0D406F35EB7EE6DDD676B4927E2062B420C3B52480F802C96AEFCA6210
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... .......Cz.g....................................$....!...........s..........`.......8...........T............:...............!...........#..............................................................................eJ......p$......Lw......................T...........?z.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8972
                                      Entropy (8bit):3.69776855960532
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJzfPy6Y2Dso+OgmfxrJFItpDp89bj8dZ0fUhm:R6lXJzXy6YRoPgmfxrbIuj8dqff
                                      MD5:6D90F8389505D9FF8A30C8D643E20257
                                      SHA1:3280959CBA15F04855BF9C6462986FAEF60B983B
                                      SHA-256:C77F6BC6A1A2F07397286DD7EEF98DD92D93426592A6C8621908A30A2C202B58
                                      SHA-512:FD8318C1667CCA3AD1B938979FD1DA96C9692A169148008EB8E76623E359C033A48BEC828628090A6ACE006E63334B83F924C97FAF34359DFC71DC168A74041A
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.2.8.<./.P.i.
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4951
                                      Entropy (8bit):4.522637604894354
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zsQEJg771I9ClWpW8VYlYm8M4J5RcJsFgnyq8v2cJgSPsPwd:uIjfQCI7BU7VNJSW+WQwd
                                      MD5:6E481B0AA267E61EB5771C4F31682835
                                      SHA1:321459861D0F91B7942E612BDF921C2B1FAEBC4D
                                      SHA-256:3763DFDF154F2460FBE69A27596D08C4BFF083344A27E05F677502CE881D0FD0
                                      SHA-512:4AD5660731DC80ED751CCBD659FB1C04200215BE4A0E4EF110908865D406AEC07AB43722A1C5C5764172B25E6F1D7562DD22B386E238E88B65F7C61395067BFF
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552289" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF, LF line terminators
                                      Category:dropped
                                      Size (bytes):5020
                                      Entropy (8bit):3.272170206697787
                                      Encrypted:false
                                      SSDEEP:96:pwpIi/kXkkX0kL0uWl0QU0Q30Qg60QXv0Qp0Q42r7rg6XBjszeuzSzbxGQI5Uhm/:pKl1JuIW88oeyOkNKYIng
                                      MD5:9F210EF41E197011363F6AAE7362660B
                                      SHA1:8430727AFB6FE44F1C2E38C7AAB3A3A8637D295C
                                      SHA-256:77FEA6079CA91D2DAA5E2A4EE2E5DAB630C900E0F70D4B77DFBA00755FF648A1
                                      SHA-512:A677155259F29D81307ADF96C26FF133CA813C84406420C399D84EAD0A16612BB383D81B6AEC1ECE9B29ABD06682F21D007EAFC9F39FAF7320A7A1565B0C24EE
                                      Malicious:false
                                      Preview:......S.n.a.p.s.h.o.t. .s.t.a.t.i.s.t.i.c.s.:.....-. .S.i.g.n.a.t.u.r.e. . . . . . . . . . . . . . . . .:. .P.S.S.D.......-. .F.l.a.g.s./.C.a.p.t.u.r.e.F.l.a.g.s. . . . . . . .:. .0.0.0.0.0.0.0.1./.d.0.0.0.3.9.f.f.......-. .A.u.x. .p.a.g.e.s. . . . . . . . . . . . . . . . .:. .1. .e.n.t.r.i.e.s. .l.o.n.g.......-. .V.A. .s.p.a.c.e. .s.t.r.e.a.m. . . . . . . . . . .:. .7.3.1.6.8. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .t.r.a.c.e. .s.t.r.e.a.m. . . . . . .:. .0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .s.t.r.e.a.m. . . . . . . . . . . . .:. .3.6.3.5.2. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .T.h.r.e.a.d.s. . . . . . . . . . . . . . . . . . .:. .1.3. .t.h.r.e.a.d.s.......-. .T.h.r.e.a.d. .s.t.r.e.a.m. . . . . . . . . . . . .:. .2.8.9.6. .b.y.t.e.s. .i.n. .s.i.z.e...........S.n.a.p.s.h.o.t. .p.e.r.f.o.r.m.a.n.c.e. .c.o.u.n.t.e.r.s.:.....-. .T.o.t.a.l.C.y.c.l.e.C.o.u.n.t. . . . . . . . . . .:. .2.9.6.9.1.5.5.5. .c.y.c.l.e.s.......-. .V.a.C.l.o.n.e.C.y.c.l.e.C.o.u.n.t. . . .
                                      Process:C:\Windows\System32\WerFault.exe
                                      File Type:MS Windows registry file, NT/2000 or above
                                      Category:dropped
                                      Size (bytes):1835008
                                      Entropy (8bit):4.468968767600675
                                      Encrypted:false
                                      SSDEEP:6144:HzZfpi6ceLPx9skLmb0fDZWSP3aJG8nAgeiJRMMhA2zX4WABluuNfjDH5S:TZHtDZWOKnMM6bFpVj4
                                      MD5:83E25327D7D463FEDBB2704DEFA11AD3
                                      SHA1:5B2183662BDF1205507D7C9BF59AF21FF1F71A63
                                      SHA-256:580D8C4286B78CF7632B2AC26DD1410072B3AF71F1974ADDD00603612A0D71D0
                                      SHA-512:BE0864BA13B633EDADA90544140B40B0424D7514D2B403781173D6AED218F693C4FAE6E9F78AD55F0EBA1BD13B240773BBBF4E0FA5356AD113AF7E809092B8E4
                                      Malicious:false
                                      Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..A.9#..............................................................................................................................................................................................................................................................................................................................................mRW.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):208
                                      Entropy (8bit):2.4305258110308814
                                      Encrypted:false
                                      SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                      MD5:FC51E3860D2A83AD586811F10DFB46C0
                                      SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                      SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                      SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                      Malicious:false
                                      Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):7.923604952802972
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                      File size:6'471'168 bytes
                                      MD5:aa9523b95bc34170cfc2e8d618486389
                                      SHA1:7a73553ffde3653c2a59bb90170291bf06499180
                                      SHA256:52bed0a4e8b6690f0365fd2ada184c7ab3a37bc3ab0ff8354a9f9409103d208c
                                      SHA512:a7945ad1ad6e7151671eaefb2152b11af2fffa2c051534073b5cb029085ba47bac30edad1153d6b5700c085356d263f0b7cb552c7e77fd277d611aa62dee1fc6
                                      SSDEEP:196608:BA1jCmcNsAVa9qZ/SKnQ9KEdFL/SCiYTHP7n:Xmc2AcqZ+jdR/SCzD7
                                      TLSH:C05622EBA148378CD41A84B09423F947B1F6971E1EF999DE70CBFBC07B9A815D502B42
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....3.f.........."....&.8...........6e........@.............................0............`................................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x140653684
                                      Entrypoint Section:.vmp1
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66EE33E8 [Sat Sep 21 02:48:08 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:e52c146e3e628600aa515c087a001413
                                      Instruction
                                      push 08519852h
                                      call 00007F6D2D091177h
                                      add byte ptr [eax], al
                                      add dword ptr [eax], eax
                                      add byte ptr [eax], al
                                      jecxz 00007F6D2CB946C8h
                                      inc ebx
                                      fsubr st(1), st(0)
                                      in eax, 6Bh
                                      jl 00007F6D2CB947B3h
                                      dec edx
                                      adc eax, 7E617BFFh
                                      dec eax
                                      sub byte ptr [ecx], bl
                                      xchg eax, edx
                                      fld tbyte ptr [ecx]
                                      sti
                                      std
                                      dec edx
                                      movsd
                                      sbb eax, A1A7FBB0h
                                      call far fword ptr [ebp-5A8F1950h]
                                      jecxz 00007F6D2CB947ACh
                                      pop esp
                                      dec esp
                                      sub eax, 406FEC2Ah
                                      dec edi
                                      sub eax, 9852DB25h
                                      enter CB9Eh, BAh
                                      aam E6h
                                      adc bh, cl
                                      sbb edx, dword ptr [ebp+edi*4-71B699E3h]
                                      cmc
                                      jle 00007F6D2CB94714h
                                      dec ebx
                                      push cs
                                      mov byte ptr [edi], dh
                                      iretd
                                      in al, 63h
                                      in eax, 41h
                                      adc eax, DF96AA9Ch
                                      in eax, 63h
                                      jnl 00007F6D2CB947C0h
                                      xor dword ptr [edx+7A56A371h], esi
                                      sbb ebx, dword ptr [ecx+edi*8]
                                      fstp tbyte ptr [edx+45h]
                                      mov ss, bp
                                      mov al, 91h
                                      inc esi
                                      mov seg?, di
                                      or ch, byte ptr [ebx+47h]
                                      mov fs, word ptr [8E4748C5h]
                                      lds edi, fword ptr [ebp+44h]
                                      mov cs, word ptr [0E46C986h]
                                      sub byte ptr [edi+1563E9D4h], dh
                                      sar dword ptr [B6AA9C18h], 1
                                      les ebp, eax
                                      arpl bp, sp
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x5f56400xc4f.vmp1
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa1baa00x2bc.vmp1
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb820000x1e0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb706800xfe28.vmp1
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb810000xe0.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x5de6280x30.vmp1
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb705400x140.vmp1
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x58d0000x280.vmp1
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x1237700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x1250000x4ae000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x1700000x56b980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x1c70000xd0c80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .vmp00x1d50000x37f54b0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .vmp10x5550000x62b4a80x62b600af769d4baf55b57f5c139d34c765bcf5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .reloc0xb810000xe00x2008b0e79e8e23270fbce3ebe7e5682bd80False0.3515625GLS_BINARY_LSB_FIRST2.1488592077073276IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0xb820000x1e00x2003b7c0ddc0e50a3edf757279182f52038False0.537109375data4.758721582235538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0xb820580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      d3d11.dllD3D11CreateDeviceAndSwapChain
                                      D3DCOMPILER_47.dllD3DCompile
                                      KERNEL32.dllReadFile
                                      USER32.dllSetCursor
                                      ADVAPI32.dllControlService
                                      MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
                                      dwmapi.dllDwmExtendFrameIntoClientArea
                                      WINHTTP.dllWinHttpSendRequest
                                      CRYPT32.dllCertCreateCertificateChainEngine
                                      IMM32.dllImmReleaseContext
                                      Normaliz.dllIdnToAscii
                                      WLDAP32.dll
                                      WS2_32.dllntohl
                                      RPCRT4.dllRpcStringFreeA
                                      PSAPI.DLLGetModuleInformation
                                      USERENV.dllUnloadUserProfile
                                      VCRUNTIME140_1.dll__CxxFrameHandler4
                                      VCRUNTIME140.dll__current_exception_context
                                      api-ms-win-crt-runtime-l1-1-0.dllexit
                                      api-ms-win-crt-stdio-l1-1-0.dllfgetc
                                      api-ms-win-crt-heap-l1-1-0.dllfree
                                      api-ms-win-crt-math-l1-1-0.dllacosf
                                      api-ms-win-crt-string-l1-1-0.dllstrncmp
                                      api-ms-win-crt-convert-l1-1-0.dllatoi
                                      api-ms-win-crt-utility-l1-1-0.dllqsort
                                      api-ms-win-crt-filesystem-l1-1-0.dll_access
                                      api-ms-win-crt-locale-l1-1-0.dlllocaleconv
                                      api-ms-win-crt-time-l1-1-0.dll_time64
                                      SHELL32.dllShellExecuteA
                                      WTSAPI32.dllWTSSendMessageW
                                      KERNEL32.dllGetSystemTimeAsFileTime
                                      USER32.dllGetUserObjectInformationW
                                      KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                      USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 20, 2024 23:46:42.604621887 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:42.604655027 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:42.604722977 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:42.608809948 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:42.608828068 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.376514912 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.376595974 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.380809069 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.380819082 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.381105900 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.427927971 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.449408054 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.491416931 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622487068 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622529030 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622555971 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622589111 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622601986 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.622618914 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622648001 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622672081 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622692108 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622706890 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.622708082 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.622720003 CEST44349714172.67.72.57192.168.2.6
                                      Oct 20, 2024 23:46:43.622739077 CEST49714443192.168.2.6172.67.72.57
                                      Oct 20, 2024 23:46:43.627094984 CEST49714443192.168.2.6172.67.72.57
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 20, 2024 23:46:42.584055901 CEST5100853192.168.2.61.1.1.1
                                      Oct 20, 2024 23:46:42.592977047 CEST53510081.1.1.1192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 20, 2024 23:46:42.584055901 CEST192.168.2.61.1.1.10x9894Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 20, 2024 23:46:42.592977047 CEST1.1.1.1192.168.2.60x9894No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                      Oct 20, 2024 23:46:42.592977047 CEST1.1.1.1192.168.2.60x9894No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                      Oct 20, 2024 23:46:42.592977047 CEST1.1.1.1192.168.2.60x9894No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                      • keyauth.win
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.649714172.67.72.574435128C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-20 21:46:43 UTC95OUTGET / HTTP/1.1
                                      Connection: Keep-Alive
                                      User-Agent: CPlusPlusExample/1.0
                                      Host: keyauth.win
                                      2024-10-20 21:46:43 UTC1128INHTTP/1.1 200 OK
                                      Date: Sun, 20 Oct 2024 21:46:43 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                      Cache-Control: max-age=14400
                                      CF-Cache-Status: HIT
                                      Age: 967
                                      Accept-Ranges: bytes
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cvrTdsqyfvPykyICL8qqZHbVzHthYXlQlVVNDnb4YNf9Jos7Q7p0djfI4x%2BECdMEMl7u159YfmYWLvzhO33%2BLoeUx4kAwVe%2F%2Ff1wFGQokjGdApXFHXGUf56QbpNI"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Acknowledge: Credit to VaultCord.com
                                      X-Powered-By: VaultCord.com
                                      content-security-policy: upgrade-insecure-requests
                                      permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                      referrer-policy: strict-origin-when-cross-origin
                                      strict-transport-security: max-age=31536000; includeSubDomains
                                      x-content-security-policy: img-src *; media-src * data:;
                                      x-content-type-options: nosniff
                                      x-frame-options: DENY
                                      x-xss-protection: 1; mode=block
                                      Server: cloudflare
                                      CF-RAY: 8d5c33c61bad0fd1-LAX
                                      2024-10-20 21:46:43 UTC241INData Raw: 37 62 33 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 20 2d
                                      Data Ascii: 7b36<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="KeyAuth -
                                      2024-10-20 21:46:43 UTC1369INData Raw: 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72
                                      Data Ascii: Open Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name="author
                                      2024-10-20 21:46:43 UTC1369INData Raw: 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20
                                      Data Ascii: "> <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:title"
                                      2024-10-20 21:46:43 UTC1369INData Raw: 6f 6e 74 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 43 6c 6f
                                      Data Ascii: ontent="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" content="Clo
                                      2024-10-20 21:46:43 UTC1369INData Raw: 72 3a 6f 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72 6f 75 6e 64 65 64 2d
                                      Data Ascii: r:opacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium rounded-
                                      2024-10-20 21:46:43 UTC1369INData Raw: 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c 2d 34 2e 32 39 33 20
                                      Data Ascii: xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293
                                      2024-10-20 21:46:43 UTC1369INData Raw: 75 72 65 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 62 6f 72
                                      Data Ascii: ures</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-medium bor
                                      2024-10-20 21:46:43 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63
                                      Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]"> <div c
                                      2024-10-20 21:46:43 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                      Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:17:46:39
                                      Start date:20/10/2024
                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exe"
                                      Imagebase:0x7ff7470b0000
                                      File size:6'471'168 bytes
                                      MD5 hash:AA9523B95BC34170CFC2E8D618486389
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:17:46:39
                                      Start date:20/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:17:46:42
                                      Start date:20/10/2024
                                      Path:C:\Windows\System32\WerFault.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 5128 -s 1524
                                      Imagebase:0x7ff7b8110000
                                      File size:570'736 bytes
                                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:17:47:17
                                      Start date:20/10/2024
                                      Path:C:\Windows\System32\WerFault.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 5128 -s 1540
                                      Imagebase:0x7ff7b8110000
                                      File size:570'736 bytes
                                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      No disassembly