Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe
Analysis ID:1541498
MD5:964ba2cc1e16b71d3b7f97e9a34c6a7e
SHA1:58d1757be7f47c63840d190722943afb72a55697
SHA256:a2455c64491969b7b24dae79de65ff94158e4459a7abed583fac5a7178883763
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe (PID: 1740 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe" MD5: 964BA2CC1E16B71D3B7F97E9A34C6A7E)
    • WerFault.exe (PID: 5344 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeAvira: detected
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeString found in binary or memory: http://www.clamav.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeCode function: 0_2_004012730_2_00401273
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 232
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeStatic PE information: Section .clam01
Source: classification engineClassification label: mal64.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1740
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\23715079-52b3-409b-a816-6e4495f1899aJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 232
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .clam01
Source: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeStatic PE information: section name: .clam01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeCode function: 0_2_00408A7C push ebx; iretd 0_2_00408A7F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeCode function: 0_2_004081C0 push 0000001Fh; iretd 0_2_004081CA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeCode function: 0_2_004085D4 push eax; ret 0_2_004085E5
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exeCode function: 0_2_00401000 EntryPoint,LdrInitializeThunk,0_2_00401000
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe34%ReversingLabs
SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe100%AviraTR/Crypt.XPACK.Gen
SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.clamav.netSecuriteInfo.com.Win32.Evo-gen.23762.14678.exefalse
    unknown
    http://upx.sf.netAmcache.hve.3.drfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1541498
    Start date and time:2024-10-24 22:20:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 4s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe
    Detection:MAL
    Classification:mal64.winEXE@2/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 1
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.22
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe
    TimeTypeDescription
    16:21:17API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6721764384678723
    Encrypted:false
    SSDEEP:384:2JEewvdu0BU/e93jEzuiFlY4IO8K4BMr:2JEdY0BU/e93jEzuiFlY4IO8K42
    MD5:BF66D4B6E6239AC82CC92D9F96D242A4
    SHA1:EA2F604EAACA3509D0137175EB2D1FBC8CE403A0
    SHA-256:2BF9FA8ED5128B03C8B886D2FAD2B20054BAD042935D664A93D06601C118E4AA
    SHA-512:F85F24211B17F186780005789A67BE3FBD253C53743110629367BE2D8C749A8B0B75884C9D7DD0CD7EFC1A75721D097041C01D30F11C7BA7C777B3F4DF8059ED
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.4.8.6.3.6.8.0.2.6.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.4.8.6.3.9.4.5.8.9.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.7.d.a.c.9.4.-.4.5.0.8.-.4.0.6.4.-.a.4.3.5.-.e.0.2.1.c.a.d.6.6.d.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.7.b.5.9.8.6.-.f.a.a.5.-.4.9.e.f.-.8.d.5.6.-.2.1.7.e.0.1.3.f.9.f.6.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.3.2...E.v.o.-.g.e.n...2.3.7.6.2...1.4.6.7.8...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.6.c.c.-.0.0.0.1.-.0.0.1.4.-.d.f.1.a.-.8.c.3.f.5.2.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.a.6.0.d.c.3.a.5.d.8.5.6.c.f.7.8.d.a.4.d.2.5.c.0.6.5.a.7.e.d.0.0.0.0.f.f.f.f.!.0.0.0.0.5.8.d.1.7.5.7.b.e.7.f.4.7.c.6.3.8.4.0.d.1.9.0.7.2.2.9.4.3.a.f.b.7.2.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 20:21:03 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18560
    Entropy (8bit):1.9472033044929042
    Encrypted:false
    SSDEEP:96:5z8Jh6CQpMDti7nq3tvABAt/1IOXrwpaWIkWI2EI4KmtNqL:K6stOGtvAB2/rbsKmCL
    MD5:F22DBBD022E54B86C8C62234CF498314
    SHA1:CC8FC7AF2389B7A229B5543F4576A78167F904F6
    SHA-256:33BFFC13EEA5C32F2C253A3AA017D4284CD571EF7372D61313213F5FE65E92F4
    SHA-512:E6C8E1F95A059BD843DD72C63AD9FCEDEFF0C743CA83796841F85ABF891BC0CF5CF8E47EF5625266DF7425FAB84EBCC787A792D4D18571F2D14F4D7CA616B449
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ......./..g............4...............<.......T...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T.........../..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8450
    Entropy (8bit):3.7004525697183683
    Encrypted:false
    SSDEEP:192:R6l7wVeJvCP6mSJ6Y9gSU9ZibOgmfcwc/DLpr089brBsficZm:R6lXJvi6ma6YKSU9ZiigmfcT7r6fY
    MD5:24743F8B9094E65AFC7CAB816F3AA17E
    SHA1:3727A5D2C664F0D3B770D0D29140AFE6123C025C
    SHA-256:4EB2C71FACB70E892CA51C67B6175094AA8ADF057A09B8D37755391293E2F437
    SHA-512:6569F831B81597CFD0AA3F454A8FEF1C5335AD558B3690DB8B59FFF716403FE9A7A165EBE68A929E0C92D82EBFE309B18ABBF8747D1AF41D31C9AF2D440C9F36
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.7.4.0.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4779
    Entropy (8bit):4.566002123306758
    Encrypted:false
    SSDEEP:48:cvIwWl8zsXJg77aI9asyWpW8VYXMYm8M4JnJmJxqFPx+q8wJ1CCazJ++vJ+dd:uIjf5I7AE7VWJJnJmJ83JcCmJ++vJ+dd
    MD5:6B3707A6847D01746EA6608EA801F203
    SHA1:0217C235DD1CDB486059BB3E2BC38409F9464AC2
    SHA-256:B9E94626C304C2C4500C0BD259F4E94AD09D2A3D4D855F1BB8E5CC522325688B
    SHA-512:E587F1DCD6F72FE1AC1DE4375FC49FDEFAFC302E02B9B43CABE8BD704D5B27860F3F8054F87FB8D8D826AEC94207AA025E398A449F968E794843EFE29E52EFD1
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557963" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465658138716157
    Encrypted:false
    SSDEEP:6144:hIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNpdwBCswSbb:iXD94+WlLZMM6YFH7+b
    MD5:8F10C7F3FF0F357F179F56483E0A31E0
    SHA1:011892047781168AF8A162BF8E5404C475C2BF11
    SHA-256:4682FEF50A46C4BAB117F44B8A4CE9E641DB2C3102401A06DB673E8C9BB556C0
    SHA-512:BB01162582E955C12405528B36C1C4969EAE74E6431F5826860778D296F3AFEA833DB0DCC59C639CAF5309A5690CE0C2DE856471F6858B666AA9C36A98219D4E
    Malicious:false
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...?R&..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Entropy (8bit):4.366161641488305
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe
    File size:41'472 bytes
    MD5:964ba2cc1e16b71d3b7f97e9a34c6a7e
    SHA1:58d1757be7f47c63840d190722943afb72a55697
    SHA256:a2455c64491969b7b24dae79de65ff94158e4459a7abed583fac5a7178883763
    SHA512:9df21b638f3efe8c48f42b67471c28d532fc294b1046cd30c4a26ce992f84a5c4c52da562d26fb57f5e0dd35179b39e203fd595b3efdf7f0a90346eb77663516
    SSDEEP:384:34AfIFu+AUgG+D/3LfxxWovCnYnULNWWzw9+i2faUl/XWY/fVM:3hRTUgD7LJKYnULNWWM9QfPp/fV
    TLSH:71137D3ADA6D80B3EFE053357760A2EE08A63DC082B5B1695439FEDA857B5D04E1436C
    File Content Preview:MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM...................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x401000
    Entrypoint Section:.clam01
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
    DLL Characteristics:
    Time Stamp:0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:1
    OS Version Minor:0
    File Version Major:1
    File Version Minor:0
    Subsystem Version Major:1
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    push 00000000h
    call 00007F2584E91E55h
    mov dword ptr [00403298h], eax
    call 00007F257EE91E55h
    mov dword ptr [0040329Ch], eax
    push 00000000h
    push 00401032h
    push 00000000h
    push 00000064h
    push dword ptr [00403298h]
    call 00007F25AEE91E55h
    push eax
    call 00007F2572E91E55h
    push ebp
    mov ebp, esp
    add esp, FFFFFFF0h
    cmp dword ptr [ebp+0Ch], 00000110h
    jne 00007F25F0E31F33h
    push edi
    push 00000BB9h
    push dword ptr [ebp+08h]
    call 00007F25BAE91E55h
    push eax
    call 00007F25E4E91E55h
    push 0000006Fh
    push dword ptr [00403298h]
    call 00007F25C6E91E55h
    push 00000000h
    push 00000031h
    push 000000C5h
    push 00000BB9h
    push dword ptr [ebp+08h]
    call 00007F25D2E91E55h
    push 00403090h
    push 00000BBAh
    push dword ptr [ebp+08h]
    call 00007F25DEE91E55h
    push 00000000h
    push 00030002h
    push 00000128h
    push dword ptr [ebp+08h]
    call 00007F25D8E91E55h
    push 00000BBBh
    push dword ptr [ebp+08h]
    call 00007F25BAE91E55h
    mov dword ptr [004032A4h], eax
    mov ecx, 00000010h
    shr ecx, 03h
    xor edi, edi
    mov eax, dword ptr [0040207Eh+edi*8]
    mov dword ptr [ebp-0Ch], eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .clam010x10000xa0000xa000966d022823becf78709984b01bf7ddefFalse0.3718505859375data4.370696988987381IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_LNK_INFO, IMAGE_SCN_LNK_OVER, IMAGE_SCN_LNK_REMOVE, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_MEM_PROTECTED, IMAGE_SCN_NO_DEFER_SPEC_EXC, IMAGE_SCN_GPREL, IMAGE_SCN_MEM_FARDATA, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_128BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_LNK_NRELOC_OVFL, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_NOT_CACHED, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:16:21:03
    Start date:24/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.23762.14678.exe"
    Imagebase:0x400000
    File size:41'472 bytes
    MD5 hash:964BA2CC1E16B71D3B7F97E9A34C6A7E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:16:21:03
    Start date:24/10/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 232
    Imagebase:0xe30000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:100%
      Total number of Nodes:2
      Total number of Limit Nodes:0
      execution_graph 243 401000 LdrInitializeThunk 244 401011 243->244

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_004081C0 1 Function_00408741 2 Function_004088C2 3 Function_00408CC2 4 Function_00409346 5 Function_00406DC9 6 Function_0040164B 7 Function_004090CC 8 Function_004056CE 9 Function_004085CE 10 Function_004091CF 11 Function_00407AD3 12 Function_004085D4 13 Function_00408556 14 Function_004093D6 15 Function_00408E57 16 Function_004090DA 17 Function_004082DE 18 Function_00408260 19 Function_00408DE5 20 Function_00408CE6 21 Function_00407667 22 Function_0040816A 23 Function_00407AEA 24 Function_0040886B 25 Function_00408D6B 26 Function_004086EB 27 Function_004085F2 28 Function_00401273 29 Function_00408BF3 30 Function_004088F5 31 Function_00407B77 32 Function_00408BF8 33 Function_004093F9 34 Function_0040747A 35 Function_00408A7C 36 Function_0040897D 37 Function_004086FE 38 Function_0040797F 39 Function_00401000 40 Function_00409080 41 Function_00408A81 42 Function_00407304 43 Function_00408E04 44 Function_00409106 45 Function_00409186 46 Function_00405787 47 Function_00408408 48 Function_0040850B 49 Function_00407C8C 50 Function_00407A0E 51 Function_00406D92 52 Function_00409314 53 Function_00409294 54 Function_00408616 55 Function_00409117 56 Function_00408C1B 57 Function_00408D9C 58 Function_00407C9D 59 Function_004084A1 60 Function_00407525 61 Function_00408D28 62 Function_00408E2A 63 Function_0040732B 64 Function_0040942E 65 Function_004067B0 66 Function_00401032 67 Function_00407833 68 Function_004086B5 69 Function_00408BB6 70 Function_00408537 71 Function_00409038 72 Function_004091B8 73 Function_004089BA 74 Function_004070BD 75 Function_00408D3F

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 401000-401007 LdrInitializeThunk 1 401011-40103f 0->1 4 401122-401126 1->4 5 401045-4010bc 1->5 6 401141-401148 4->6 7 401128-40113c 4->7 45 4010be-401106 5->45 9 401261-401267 6->9 10 40114e-401155 6->10 7->6 11 4011f6-4011fa 10->11 12 40115b-401161 10->12 16 401208-401213 11->16 17 4011fc-401206 11->17 14 401167-40119d 12->14 15 40126a-401270 12->15 36 4011b1-4011c8 14->36 37 40119f-4011af 14->37 19 401215-401219 16->19 20 401227-40122a 16->20 17->15 26 401225 19->26 27 40121b-401224 19->27 21 40122c-401230 20->21 22 40125f 20->22 28 401232-40123e 21->28 29 401246-40124a 21->29 22->15 26->22 27->26 28->29 29->22 30 40124c-401258 29->30 30->22 43 4011ca-4011da 36->43 44 4011dc-4011e9 36->44 42 4011f4 37->42 42->15 43->42 44->42 50 401108-40111d 45->50 50->4
      APIs
      • LdrInitializeThunk.NTDLL(00000000), ref: 00401002
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1862526333.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1862510553.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1862526333.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1862526333.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID: ..$DLL Library not found !$DontBeCurious04$Wrong DLL!$keymaker.dll
      • API String ID: 2994545307-1531936840
      • Opcode ID: ddb43ffd3dcb762f90bac0fc482c0ac6fe7ef424b749ae3c2bc0e0805c7bdbfa
      • Instruction ID: 8334820cd7eb8641cf12473c5727440011f1793dff42accc33345430184889dc
      • Opcode Fuzzy Hash: ddb43ffd3dcb762f90bac0fc482c0ac6fe7ef424b749ae3c2bc0e0805c7bdbfa
      • Instruction Fuzzy Hash: 1A51B230680304BAEF206F29DD82F9D3A1AAB15B35F10477AF635791F0C7F95A81964D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 52 401273-401292 54 401294-4012a6 52->54 55 4012ab-4012ba 52->55 54->55 56 4012c0-4012c6 55->56 57 4015cc-4015e4 55->57 56->57 59 4012cc-4012d2 56->59 62 4015fe-401648 57->62 59->57 60 4012d8-4014f0 59->60 92 4015e6-4015f6 60->92 93 4014f6-4014fd 60->93 92->62 93->92 94 401503-40150a 93->94 94->92 95 401510-40154a 94->95 95->92 99 401550-401597 95->99 99->92 101 401599-4015ca 99->101 101->62
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1862526333.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1862510553.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1862526333.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1862526333.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: -999-$1. S$ACBDEFGHIJKLMNOPQRSTUVWXYZ0123456789$DontBeCurious04$PQBDEFGHIJKLMNOABRSTUVWXYZ0123456789$SQ2RGK$Vybe$keymaker.dll
      • API String ID: 0-107488060
      • Opcode ID: eb19f1a30d53bd3aa8334126dd103d0cfeb42997c3af7df19c6234017c55974b
      • Instruction ID: ac6d9583fbc2a2c7dab8a3c2cf17f2322addf55b82690c8031e3b9b0817d84e6
      • Opcode Fuzzy Hash: eb19f1a30d53bd3aa8334126dd103d0cfeb42997c3af7df19c6234017c55974b
      • Instruction Fuzzy Hash: DBA12A30285386AFD301CFB89D81B957FA89B06726B0443B6D570BF2E5D6B45708C35E