Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ak3o7AZ3mH.exe

Overview

General Information

Sample name:ak3o7AZ3mH.exe
renamed because original name is a hash value
Original sample name:47c129604daac2999f41aa99d5c4c240.exe
Analysis ID:1576153
MD5:47c129604daac2999f41aa99d5c4c240
SHA1:94fbe09dc302022ce3421689f91eba5829aba815
SHA256:26143acb763ca1228f506762bac6c5a8f2c9fdcef0e531d3f8dae4acc7f5af72
Tags:exeuser-abuse_ch
Infos:

Detection

Babadeda, Conti, Mimikatz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected Babadeda
Yara detected Conti ransomware
Yara detected Mimikatz
AI detected suspicious sample
Deletes shadow drive data (may be related to ransomware)
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Enables debug privileges
Entry point lies outside standard sections
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • ak3o7AZ3mH.exe (PID: 4080 cmdline: "C:\Users\user\Desktop\ak3o7AZ3mH.exe" MD5: 47C129604DAAC2999F41AA99D5C4C240)
    • conhost.exe (PID: 2068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 4568 cmdline: C:\Windows\system32\WerFault.exe -u -p 4080 -s 1580 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
BabadedaAccording to PCrisk, Babadeda is a new sample in the crypters family, allowing threat actors to encrypt and obfuscate the malicious samples. The obfuscation allows malware to bypass the majority of antivirus protections without triggering any alerts. According to the researchers analysis, Babadeda leverages a sophisticated and complex obfuscation that shows a very low detection rate by anti-virus engines.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babadeda
NameDescriptionAttributionBlogpost URLsLink
Conti, Conti LockConti is an extremely damaging ransomware due to the speed with which it encrypts data and spreads to other systems. It was first observed in 2020 and it is thought to be led by a Russia-based cybercrime group that goes under the Wizard Spider pseudonym. In early May 2022, the US government announced a reward of up to $10 million for information on the Conti ransomware gang.
  • WIZARD SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.conti
NameDescriptionAttributionBlogpost URLsLink
MimiKatzVaronis summarizes Mimikatz as an open-source application that allows users to view and save authentication credentials like Kerberos tickets. Benjamin Delpy continues to lead Mimikatz developments, so the toolset works with the current release of Windows and includes the most up-to-date attacks.Attackers commonly use Mimikatz to steal credentials and escalate privileges: in most cases, endpoint protection software and anti-virus systems will detect and delete it. Conversely, pentesters use Mimikatz to detect and exploit vulnerabilities in your networks so you can fix them.
  • APT32
  • Anunak
  • GALLIUM
https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Conti_ransomwareYara detected Conti ransomwareJoe Security
    00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Mimikatz_3Yara detected MimikatzJoe Security
      00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Conti_ransomwareYara detected Conti ransomwareJoe Security
        00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Mimikatz_3Yara detected MimikatzJoe Security
          Process Memory Space: ak3o7AZ3mH.exe PID: 4080JoeSecurity_Conti_ransomwareYara detected Conti ransomwareJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.3.ak3o7AZ3mH.exe.24c0c4956ec.2.raw.unpackJoeSecurity_BabadedaYara detected BabadedaJoe Security
              0.3.ak3o7AZ3mH.exe.24c0c4956ec.2.raw.unpackJoeSecurity_Mimikatz_3Yara detected MimikatzJoe Security
                0.2.ak3o7AZ3mH.exe.7ff68f64b6ec.1.raw.unpackJoeSecurity_BabadedaYara detected BabadedaJoe Security
                  0.2.ak3o7AZ3mH.exe.7ff68f64b6ec.1.raw.unpackJoeSecurity_Mimikatz_3Yara detected MimikatzJoe Security
                    0.3.ak3o7AZ3mH.exe.24c0c45eae7.0.raw.unpackJoeSecurity_BabadedaYara detected BabadedaJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: ak3o7AZ3mH.exeAvira: detected
                      Source: https://aridekvm.us/files/aridekvm.exeAvira URL Cloud: Label: malware
                      Source: ak3o7AZ3mH.exeReversingLabs: Detection: 39%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: ak3o7AZ3mH.exeJoe Sandbox ML: detected
                      Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49706 version: TLS 1.2
                      Source: ak3o7AZ3mH.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdbGCTL source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Desktop\hwid-master\hwid-master\User\x64\Release\User.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\Driver-HWID-btbd-modified-main\x64\Release\Kernel.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: rea de Trabalho\hwid-info-ReFo\x64\Release\hwid_info.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Desktop\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NullSubwoofer\x64\Release\NullDriver.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\nicov\OneDrive\Desktop\Vanity Premium Sp00fer\Kernelmode\build\bin\Kernelmode.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: pia\bin\x64\Release\net6.0\win-x64\native\AridekVM.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\KDU-1.2.7\KDU-1.2.7\Source\Hamakaze\output\x64\Release\kdu.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Yhome\source\repos\Gdrv-Loader-Updated\bin\gdrvloader.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: global trafficHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winConnection: Keep-AliveContent-Type: application/x-www-form-urlencodedContent-Length: 380
                      Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: keyauth.win
                      Source: unknownHTTP traffic detected: POST /api/1.0/ HTTP/1.1Host: keyauth.winConnection: Keep-AliveContent-Type: application/x-www-form-urlencodedContent-Length: 380
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.css
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.jpg
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawtePCA.crl0
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cs-g2-crl.thawte.com/ThawteCSG2.crl0
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://html4/loose.dtd
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1580197827.0000024C0C281000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://keyauth.win:443/Pe
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/0DataContractXmlNamespacedhttp://schemas.datacontract.org/20
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.Collections.Generic
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.Collections.GenericS
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.IO
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.Runtime.SerializationBISerializableFactoryTypeLocalNa
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.ThrowHelperArgumentNull
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.Xml
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name(DefaultRoleClaimTypexhttp://schemas.micro
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/GlobalizationInvariantMode
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/binaryformatter
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-illink/com
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-illink/nativehost
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/dotnet-warnings/
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://aridekvm.us/files/aridekvm.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/runtime
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.0/
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49706 version: TLS 1.2

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68ec80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ak3o7AZ3mH.exe PID: 4080, type: MEMORYSTR
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /All /Quiet
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: \\.\%c:%c:\Windows\System32\restore\MachineGuid.txt%c:\Users\Public\Libraries\collection.dat%c:\System Volume Information\IndexerVolumeGuid%c:\System Volume Information\WPSettings.dat%c:\System Volume Information\tracking.log%c:\ProgramData\Microsoft\Windows\WER%c:\Users\Public\Shared Files%c:\Windows\INF\setupapi.dev.log%c:\Windows\INF\setupapi.setup.log%c:\Users\Public\Libraries%c:\MSOCache%c:\ProgramData\ntuser.pol%c:\Users\Default\NTUSER.DAT%c:\Recovery\ntuser.sys%c:\desktop.ini%c:\Windows\Prefetch\*%c:\Windows\Prefetch\%ws%c:\Users\*%c:\Users\%ws\*ntuser%c:\Users\%ws\%ws%c:\Usersdesktop.inifsutil usn deletejournal /d %c:vssadmin delete shadows /All /QuietWmiPrvSE.exeKilled Winmgmt
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vssadmin delete shadows /All /Quiet
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: \\.\%c:%c:\Windows\System32\restore\MachineGuid.txt%c:\Users\Public\Libraries\collection.dat%c:\System Volume Information\IndexerVolumeGuid%c:\System Volume Information\WPSettings.dat%c:\System Volume Information\tracking.log%c:\ProgramData\Microsoft\Windows\WER%c:\Users\Public\Shared Files%c:\Windows\INF\setupapi.dev.log%c:\Windows\INF\setupapi.setup.log%c:\Users\Public\Libraries%c:\MSOCache%c:\ProgramData\ntuser.pol%c:\Users\Default\NTUSER.DAT%c:\Recovery\ntuser.sys%c:\desktop.ini%c:\Windows\Prefetch\*%c:\Windows\Prefetch\%ws%c:\Users\*%c:\Users\%ws\*ntuser%c:\Users\%ws\%ws%c:\Usersdesktop.inifsutil usn deletejournal /d %c:vssadmin delete shadows /All /QuietWmiPrvSE.exeKilled Winmgmt

                      System Summary

                      barindex
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4080 -s 1580
                      Source: ak3o7AZ3mH.exeStatic PE information: Number of sections : 15 > 10
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTanikaze.dll( vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHamakaze.exe( vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegdrv.sysf# vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1463575601.0000024C0A5B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1583130919.00007FF6903A9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000000.1436773073.00007FF690497000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTanikaze.dll( vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHamakaze.exe( vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegdrv.sysf# vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exeBinary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe
                      Source: ak3o7AZ3mH.exeStatic PE information: Section: ZLIB complexity 0.9980157743570801
                      Source: ak3o7AZ3mH.exeStatic PE information: Section: ZLIB complexity 1.0607734806629834
                      Source: ak3o7AZ3mH.exeStatic PE information: Section: ZLIB complexity 1.0062182023742228
                      Source: ak3o7AZ3mH.exeStatic PE information: Section: ZLIB complexity 1.000452890661743
                      Source: ak3o7AZ3mH.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
                      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/6@1/1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2068:120:WilError_03
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4080
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7d0cbdd1-2349-4d04-8628-06ff173815b5Jump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: ak3o7AZ3mH.exeReversingLabs: Detection: 39%
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeFile read: C:\Users\user\Desktop\ak3o7AZ3mH.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\ak3o7AZ3mH.exe "C:\Users\user\Desktop\ak3o7AZ3mH.exe"
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4080 -s 1580
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: icu.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: wshunix.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSection loaded: gpapi.dllJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: ak3o7AZ3mH.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: ak3o7AZ3mH.exeStatic file information: File size 18362384 > 1048576
                      Source: ak3o7AZ3mH.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x269c08
                      Source: ak3o7AZ3mH.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x9ea35f
                      Source: ak3o7AZ3mH.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x440400
                      Source: ak3o7AZ3mH.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdbGCTL source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Desktop\hwid-master\hwid-master\User\x64\Release\User.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\Driver-HWID-btbd-modified-main\x64\Release\Kernel.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: rea de Trabalho\hwid-info-ReFo\x64\Release\hwid_info.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Desktop\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NullSubwoofer\x64\Release\NullDriver.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\nicov\OneDrive\Desktop\Vanity Premium Sp00fer\Kernelmode\build\bin\Kernelmode.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp
                      Source: Binary string: pia\bin\x64\Release\net6.0\win-x64\native\AridekVM.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\rapha\Downloads\KDU-1.2.7\KDU-1.2.7\Source\Hamakaze\output\x64\Release\kdu.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Yhome\source\repos\Gdrv-Loader-Updated\bin\gdrvloader.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: 0.3.ak3o7AZ3mH.exe.24c0c4956ec.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68f64b6ec.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.ak3o7AZ3mH.exe.24c0c45eae7.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68f614ae7.3.raw.unpack, type: UNPACKEDPE
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name:
                      Source: ak3o7AZ3mH.exeStatic PE information: section name: .exports
                      Source: ak3o7AZ3mH.exeStatic PE information: section name: .imports
                      Source: ak3o7AZ3mH.exeStatic PE information: section name: .themida
                      Source: ak3o7AZ3mH.exeStatic PE information: section name: .boot
                      Source: ak3o7AZ3mH.exeStatic PE information: section name: entropy: 7.9812997049774665

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: FilemonClassJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: RegmonClassJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: RegmonclassJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: FilemonclassJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeMemory allocated: 24C0A5C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeMemory allocated: 24C0C280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeMemory allocated: 24C2C280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: ak3o7AZ3mH.exe, 00000000.00000002.1579814514.0000024C0A647000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeSystem information queried: ModuleInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeThread information set: HideFromDebuggerJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: regmonclass
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: procmon_window_class
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: filemonclass
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeProcess token adjusted: DebugJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeNtSetInformationThread: Indirect: 0x7FF69096E07AJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeNtQueryInformationProcess: Indirect: 0x7FF69095B980Jump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeNtQueryInformationProcess: Indirect: 0x7FF69096DDDFJump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeNtQuerySystemInformation: Indirect: 0x7FF690938144Jump to behavior
                      Source: C:\Users\user\Desktop\ak3o7AZ3mH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.3.ak3o7AZ3mH.exe.24c0c4956ec.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68f64b6ec.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.ak3o7AZ3mH.exe.24c0c45eae7.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.ak3o7AZ3mH.exe.24c0c59a2f1.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68f7502f1.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68f614ae7.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ak3o7AZ3mH.exe.7ff68ec80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ak3o7AZ3mH.exe PID: 4080, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      1
                      Process Injection
                      33
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping531
                      Security Software Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      Abuse Elevation Control Mechanism
                      2
                      Software Packing
                      LSASS Memory33
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media2
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      1
                      Process Injection
                      Security Account Manager3
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive3
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Abuse Elevation Control Mechanism
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      File Deletion
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      ak3o7AZ3mH.exe39%ReversingLabsWin64.Trojan.Bsymem
                      ak3o7AZ3mH.exe100%AviraTR/Bsymem.rwsit
                      ak3o7AZ3mH.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://aridekvm.us/files/aridekvm.exe100%Avira URL Cloudmalware
                      http://schemas.datacontract.org/2004/07/0DataContractXmlNamespacedhttp://schemas.datacontract.org/200%Avira URL Cloudsafe
                      http://schemas.datacontract.org/2004/07/System.Collections.GenericS0%Avira URL Cloudsafe
                      http://schemas.datacontract.org/2004/07/System.Collections.Generic0%Avira URL Cloudsafe
                      http://schemas.datacontract.org/2004/07/System.Runtime.SerializationBISerializableFactoryTypeLocalNa0%Avira URL Cloudsafe
                      http://schemas.datacontract.org/2004/07/System.ThrowHelperArgumentNull0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      keyauth.win
                      104.26.0.5
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://keyauth.win/api/1.0/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://html4/loose.dtdak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://aridekvm.us/files/aridekvm.exeak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://schemas.datacontract.org/2004/07/ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name(DefaultRoleClaimTypexhttp://schemas.microak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.thawte.com0ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/dotnet-illink/comak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://upx.sf.netAmcache.hve.5.drfalse
                                      high
                                      http://schemas.datacontract.org/2004/07/System.Xmlak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                                        high
                                        http://.cssak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://keyauth.win/api/1.1/ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                                            high
                                            https://github.com/dotnet/runtimeak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.datacontract.org/2004/07/0DataContractXmlNamespacedhttp://schemas.datacontract.org/20ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.datacontract.org/2004/07/System.Runtime.SerializationBISerializableFactoryTypeLocalNaak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://cs-g2-crl.thawte.com/ThawteCSG2.crl0ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                                                  high
                                                  https://aka.ms/dotnet-warnings/ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crl.thawte.com/ThawteTimestampingCA.crl0ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.thawte.com/ThawtePCA.crl0ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.datacontract.org/2004/07/System.Collections.Genericak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://schemas.datacontract.org/2004/07/System.ThrowHelperArgumentNullak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://schemas.datacontract.org/2004/07/System.Collections.GenericSak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://keyauth.win:443/Peak3o7AZ3mH.exe, 00000000.00000002.1580197827.0000024C0C281000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://aka.ms/binaryformatterak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/GlobalizationInvariantModeak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.datacontract.org/2004/07/System.IOak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmpfalse
                                                                  high
                                                                  http://.jpgak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://aka.ms/dotnet-illink/nativehostak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.26.0.5
                                                                      keyauth.winUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1576153
                                                                      Start date and time:2024-12-16 15:35:45 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 5m 19s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:11
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:ak3o7AZ3mH.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:47c129604daac2999f41aa99d5c4c240.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.rans.troj.evad.winEXE@3/6@1/1
                                                                      EGA Information:Failed
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 0
                                                                      • Number of non-executed functions: 0
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.177.146, 52.149.20.212
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • VT rate limit hit for: ak3o7AZ3mH.exe
                                                                      TimeTypeDescription
                                                                      09:36:57API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.26.0.5IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                        IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                              IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                                                SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                                                                  SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                                                                    SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                                                                      SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                                                                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          keyauth.winAclatis tool.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.1.5
                                                                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.1.5
                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          exe004.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                                                          • 104.26.0.5
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          CLOUDFLARENETUShttps://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSL813n1NSUgoHlh-2FH8jVXE55TTo10JYMDP3MpP9biJ-2BivxRElKJfGcSf3Wm0bk6-2BuL6x9TaALAI-2BL1qw1Dee2Qg-3DwH82_lUpiXeYCZ5wahax4fkypnG65rENS0eHcuXkODr9BV8nkC0Nc6-2BAihSf0cmYNntTLO4SyowozBXe6Qe-2Bbp-2FFF3a1FIQOXuBqEKUpfXMQ5PPxSuhMxN-2FGKw6aVp7-2FrJaFsaK3MxWcXiB-2FQGWayulE8-2FtCvMhmv4KaADpZ-2B0qQmLVPxqh24uJt9FaNBQBIm1l70gJHtveQ3b-2FplaZ4NS9-2FFv9-2FcAZ4BnOdGLbd-2BNZzE9Ba47yxwqIyGzlJ-2BmDN57eM41CachqUTFf5upDlE1JEwIy6eZ7t9nvf-2Fc9lQV8qupSe0IpWj5cFkfBjNJ9myaj1i3KCzGOXUSk-2F4E-2FHX-2BkuwdmqzU7u2OKMrHZeEXOJLiSw-3D#CGet hashmaliciousUnknownBrowse
                                                                                          • 172.67.140.19
                                                                                          qvkwOs4JfC.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                          • 104.21.50.161
                                                                                          InvoiceNr274728.pdf.lnkGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.64.1
                                                                                          https://qidinfissi.powerappsportals.com/Get hashmaliciousUnknownBrowse
                                                                                          • 104.18.3.157
                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                          • 104.21.50.161
                                                                                          arm.elfGet hashmaliciousUnknownBrowse
                                                                                          • 162.159.133.234
                                                                                          https://iwr.soundestlink.com/ce/c/676002d8893d08b60d0548a9/67600e317a8dc234ff2c418f/67600e4e1033e9cdafe04236?signature=d71ee5ef2af4c3905acd300a8f3b595d0164d440b8def5e7254a839fa6b579a9Get hashmaliciousUnknownBrowse
                                                                                          • 172.64.145.78
                                                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                          • 104.21.67.152
                                                                                          https://simatantincendi.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                          • 104.17.25.14
                                                                                          https://business.livechathelpsuite.comGet hashmaliciousUnknownBrowse
                                                                                          • 172.67.163.209
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          3b5074b1b5d032e5620f69f9f700ff0ehttps://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSL813n1NSUgoHlh-2FH8jVXE55TTo10JYMDP3MpP9biJ-2BivxRElKJfGcSf3Wm0bk6-2BuL6x9TaALAI-2BL1qw1Dee2Qg-3DwH82_lUpiXeYCZ5wahax4fkypnG65rENS0eHcuXkODr9BV8nkC0Nc6-2BAihSf0cmYNntTLO4SyowozBXe6Qe-2Bbp-2FFF3a1FIQOXuBqEKUpfXMQ5PPxSuhMxN-2FGKw6aVp7-2FrJaFsaK3MxWcXiB-2FQGWayulE8-2FtCvMhmv4KaADpZ-2B0qQmLVPxqh24uJt9FaNBQBIm1l70gJHtveQ3b-2FplaZ4NS9-2FFv9-2FcAZ4BnOdGLbd-2BNZzE9Ba47yxwqIyGzlJ-2BmDN57eM41CachqUTFf5upDlE1JEwIy6eZ7t9nvf-2Fc9lQV8qupSe0IpWj5cFkfBjNJ9myaj1i3KCzGOXUSk-2F4E-2FHX-2BkuwdmqzU7u2OKMrHZeEXOJLiSw-3D#CGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          InvoiceNr274728.pdf.lnkGet hashmaliciousLummaCBrowse
                                                                                          • 104.26.0.5
                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                          • 104.26.0.5
                                                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                                                          • 104.26.0.5
                                                                                          FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                          • 104.26.0.5
                                                                                          #U00d6deme tavsiyesi.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          • 104.26.0.5
                                                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                          • 104.26.0.5
                                                                                          #U00d6deme tavsiyesi.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                          • 104.26.0.5
                                                                                          No context
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):0.9542846894802572
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:bOFmaz4+UBsZg7bCGPcQXIDcQTc65cE/cw3C+HbHg/opAnQVHMvLVxEXCvJrzxnk:Soaz4+UB90d91nj0JfzuiFLZ24lO8n
                                                                                          MD5:0A7518692ADF5758C6A700D8DAD1E31A
                                                                                          SHA1:8394A07CEFF285D18871FC3CE01D60FE4B270831
                                                                                          SHA-256:8BA6415AB6554E449573CE6791A1C349456A104C765EEB5B9E4DB7A65057AD82
                                                                                          SHA-512:FBA2A6F48BC19DA85722581DA8528D9999645131458AA219316B50CABFA11FAA2712FC6915F1C37524415BA80A6FE3403A2E3D3234525E624F9FEDC38D6A8202
                                                                                          Malicious:true
                                                                                          Reputation:low
                                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.3.3.4.0.9.2.2.5.9.1.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.3.3.4.0.9.7.1.0.2.8.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.4.c.6.f.1.6.-.0.b.4.0.-.4.5.1.b.-.9.7.4.6.-.2.7.3.b.a.a.2.4.4.b.7.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.2.a.a.2.f.c.-.5.5.9.e.-.4.f.1.d.-.9.d.4.2.-.c.7.d.2.d.0.8.2.8.c.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.a.k.3.o.7.A.Z.3.m.H...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.r.i.d.e.k.V.M...d.l.l.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.f.0.-.0.0.0.1.-.0.0.1.4.-.0.2.6.0.-.1.3.e.d.c.7.4.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.1.a.7.e.c.e.a.2.3.0.7.d.8.1.f.8.a.6.4.4.0.4.1.6.2.f.5.a.b.0.8.0.0.0.0.0.0.0.0.!.0.0.0.0.9.4.f.b.e.0.9.d.c.3.0.2.0.2.2.c.e.3.4.2.1.6.8.9.f.9.1.e.b.a.5.8.2.9.a.b.a.8.1.5.!.a.k.3.o.7.A.Z.3.m.H.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 15 streams, Mon Dec 16 14:36:49 2024, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):160092
                                                                                          Entropy (8bit):1.550369815441834
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:B7sDB12QfBvDChYEXXc2QDV0UBulqbEfdNvDJdgRCZE5Kh9WbRH:B7o2QfBv4vQDV0MulLICi5KeRH
                                                                                          MD5:CA50B0699F18CB0CA582D0B970FBD6C9
                                                                                          SHA1:FF706679D5F8F6FCBC818C8733AD4BFEAA4A56A6
                                                                                          SHA-256:7FEB69D51FC404C14967C4B783C427EE41F531986FA0C4075E1A1874DA23226C
                                                                                          SHA-512:BB7036FB2843B30EFD35F3EA0181A309D543ECB1B49EECE38425BE969F01E7F09D2448E6F944F0BEB06E3B624809DDCEFC7975FDBC46608290130538F3949CF8
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:MDMP..a..... ........;`g....................................$................[..........`.......8...........T...........x=...3..........8...........$ ..............................................................................eJ....... ......Lw......................T............:`g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):8744
                                                                                          Entropy (8bit):3.7047680209846443
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:R6l7wVeJJvrh6YSDa3hgmfPAEpDG89bnnNfTNm:R6lXJx96YGa3hgmfPAGnNf0
                                                                                          MD5:FF6DC9CB193B8719DED1FD696DE2623A
                                                                                          SHA1:16190F1052E7E51B767DE56536A5B235880BD671
                                                                                          SHA-256:4E3927B709DDD5594373104191DDACC3899168DDC9329271D75E3F739DF4C6E3
                                                                                          SHA-512:8B4581291490611F7D3EB10E284948AC9C97CA77EC9F6CE9324E1CA550AE50956F9C6631E32FEBA00904B8B65738EDE7728D0D1BC8C28593932BF7C14E0AC324
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.0.8.0.<./.P.i.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4706
                                                                                          Entropy (8bit):4.465010209041052
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwWl8zsBJg771I9SdWpW8VYwYm8M4JXjFgIyq85X88k23d:uIjfTI79s7VUJD18k23d
                                                                                          MD5:3E52E57890FE2AD2C7631F649CB9FCA1
                                                                                          SHA1:8A16263BA436F7C35A4AB855B0063FAFEE272E8B
                                                                                          SHA-256:CA9574E52A8B492374FE1A77845AE02117CA76B2F8AB8C146A7EAA02E1F57E9E
                                                                                          SHA-512:4E135751F951778DF74CD8C9C00CC25C7EFB45EFD31CAC0530663A14D77CA9BD466821A12A647B787FFDF843891F73A5571688198E7E434AFF92B06F505EFB42
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="633939" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                                          Category:dropped
                                                                                          Size (bytes):1835008
                                                                                          Entropy (8bit):4.372264562499302
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:BFVfpi6ceLP/9skLmb09yWWSPtaJG8nAge35OlMMhA2AX4WABlguN7iL:nV13yWWI/glMM6kF7Nq
                                                                                          MD5:50B43E22FFD956EFC72568FFF5EB88B5
                                                                                          SHA1:9CE962E28010CC5BF5DDB06F250F18DF93C1D553
                                                                                          SHA-256:725DB068C54A44D43525C30C02F0ADA0CD3C3783AE8A9E937112073BDDCC4DBE
                                                                                          SHA-512:72D57B0492AB04914A12360E7364D8E3A4199AA4F0CB0440B679DB9954848B9463816E7DC853562E156646DBA79A0B03835342FAB460D983FD86331FB26D2357
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj'...O...............................................................................................................................................................................................................................................................................................................................................2..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Users\user\Desktop\ak3o7AZ3mH.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1292
                                                                                          Entropy (8bit):5.258042552526023
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:8vmkX5s1Hm6LLdHm6LLYRHm7mQ1Dk7sTWWdbcis:EXX563fd3fq21o7sTlc1
                                                                                          MD5:E0FF810008EA711D897946F55D357024
                                                                                          SHA1:4001451A57E879D21B318F72B68BB96B6BC7CE99
                                                                                          SHA-256:E490C6ED034E464280DEDCCF09D3D54FB7D538A38114AE952522C4ECA09A070B
                                                                                          SHA-512:53718A304E693BCEEDE31B3D68BB05DD5A45825506A36B6D897C543A8C994B3E21FE71A37FCE824EC874B97343B28989C89E8895BB7F5B241C5A5F642DFEC323
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:\n\n Connecting....Unhandled Exception: System.Security.Cryptography.CryptographicException: Padding is invalid and cannot be removed... at System.Security.Cryptography.SymmetricPadding.GetPaddingLength(ReadOnlySpan`1, PaddingMode, Int32) + 0x1f9.. at System.Security.Cryptography.UniversalCryptoDecryptor.UncheckedTransformFinalBlock(ReadOnlySpan`1, Span`1) + 0x1ba.. at System.Security.Cryptography.UniversalCryptoDecryptor.UncheckedTransformFinalBlock(Byte[], Int32, Int32) + 0xf1.. at System.Security.Cryptography.UniversalCryptoTransform.TransformFinalBlock(Byte[], Int32, Int32) + 0x2e.. at System.Security.Cryptography.CryptoStream.<FlushFinalBlockAsync>d__30.MoveNext() + 0x9d..--- End of stack trace from previous location ---.. at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() + 0x20.. at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task) + 0xb6.. at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Tas
                                                                                          File type:PE32+ executable (console) x86-64, for MS Windows
                                                                                          Entropy (8bit):7.977252335133995
                                                                                          TrID:
                                                                                          • Win64 Executable Console (202006/5) 92.65%
                                                                                          • Win64 Executable (generic) (12005/4) 5.51%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                          • DOS Executable Generic (2002/1) 0.92%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:ak3o7AZ3mH.exe
                                                                                          File size:18'362'384 bytes
                                                                                          MD5:47c129604daac2999f41aa99d5c4c240
                                                                                          SHA1:94fbe09dc302022ce3421689f91eba5829aba815
                                                                                          SHA256:26143acb763ca1228f506762bac6c5a8f2c9fdcef0e531d3f8dae4acc7f5af72
                                                                                          SHA512:035e25a2c34465ef2c16aae9589b2d3da9336e117fb601b325b8a2a3a954e50683389ddc7bdcde6e4084caa2161bf74e48990f6ae10bfc3eea5150f139f6c61c
                                                                                          SSDEEP:393216:A+MTtFjhsNxSEWSW2oDRWDqZA/28YyI6B++nv/9HTA7GIaUVB:7MTnjhIkSW/DqkFBl/+9HTA9HVB
                                                                                          TLSH:0607339104E4BB60D525BBBA3C5A388A4142DCB99983B764F0BF49F20FC739E27D7464
                                                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........H...&...&...&...%...&...#.k.&..."...&..."...&...%...&...#...&...'...&...'...&..."...&...%...&...#...&...&...&.@.&...&.@.....&
                                                                                          Icon Hash:00928e8e8686b000
                                                                                          Entrypoint:0x141f53058
                                                                                          Entrypoint Section:.boot
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x140000000
                                                                                          Subsystem:windows cui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x63A06D54 [Mon Dec 19 13:55:32 2022 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:6
                                                                                          OS Version Minor:0
                                                                                          File Version Major:6
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:6
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:f2701d48094e29bf40d97e5ec61c7ee6
                                                                                          Instruction
                                                                                          call 00007F8358837EB7h
                                                                                          inc ecx
                                                                                          push edx
                                                                                          dec ecx
                                                                                          mov edx, esp
                                                                                          inc ecx
                                                                                          push edx
                                                                                          dec ecx
                                                                                          mov esi, dword ptr [edx+10h]
                                                                                          dec ecx
                                                                                          mov edi, dword ptr [edx+20h]
                                                                                          cld
                                                                                          mov dl, 80h
                                                                                          mov al, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          mov byte ptr [edi], al
                                                                                          dec eax
                                                                                          inc edi
                                                                                          mov ebx, 00000002h
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          jnc 00007F8358837D16h
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          jnc 00007F8358837D90h
                                                                                          xor eax, eax
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          jnc 00007F8358837E38h
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          adc eax, eax
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          adc eax, eax
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          adc eax, eax
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          adc eax, eax
                                                                                          je 00007F8358837D3Bh
                                                                                          push edi
                                                                                          mov eax, eax
                                                                                          dec eax
                                                                                          sub edi, eax
                                                                                          mov al, byte ptr [edi]
                                                                                          pop edi
                                                                                          mov byte ptr [edi], al
                                                                                          dec eax
                                                                                          inc edi
                                                                                          mov ebx, 00000002h
                                                                                          jmp 00007F8358837CBAh
                                                                                          mov eax, 00000001h
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          adc eax, eax
                                                                                          add dl, dl
                                                                                          jne 00007F8358837D39h
                                                                                          mov dl, byte ptr [esi]
                                                                                          dec eax
                                                                                          inc esi
                                                                                          adc dl, dl
                                                                                          jc 00007F8358837D18h
                                                                                          sub eax, ebx
                                                                                          mov ebx, 00000001h
                                                                                          jne 00007F8358837D60h
                                                                                          mov ecx, 00000001h
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x18140000x58.exports
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x18151350x1a8.imports
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x18170000x10b4.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1dd60b00x9ffd8.themida
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x23940000x10.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x18161280x28.tls
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          0x10000xf73780x671bb5b8c3ddd51682817975c5f93f3f27cffFalse0.9980157743570801data7.9812997049774665IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          0xf90000x6bcf580x269c081e393cd6723db90763c58c4c9bd68fb3unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          0x7b60000xeb9f1e0x9ea35fa80281b703908b5f03e3853fcbaebf31unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          0x16700000xb8a780x1bafc1f5fb801f04853cb31d43b7e028d865bFalse0.9562184755387817data7.956955203869149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          0x17290000x9ffc00x5af914b320ee2261445a24e3c517cdf6dcdc1False0.9304260315330426data7.686908132737992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          0x17c90000x15c0xb5f975b3b4f270e1bff82a091c712f5e5dFalse1.0607734806629834DOS executable (COM)6.5237779837660685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          0x17ca0000x10b80x6e9f0bbdcefb8624a07f93a725d61f3ac4eFalse1.0062182023742228data7.855005263393458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          0x17cc0000x47b680xe041015a2db17abfcab9535b8c83b2947654False1.000452890661743COM executable for DOS7.967470398662545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          .exports0x18140000x10000x200e78a77e86bd9a54737ce14f48c7d4320False0.1640625data1.1572990772090992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .imports0x18150000x10000x4002c0fd3f8949df699aaf2e396da5d4e03False0.3271484375data3.0325935221436624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .tls0x18160000x10000x2006bd75326f2b75f63e9238c17a383a460False0.0859375data0.6370836738986654IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rsrc0x18170000x12000x1200043df1f8d2d14583413676b930e84891False0.3639322916666667data4.9145070318077195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .themida0x18190000x73a0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .boot0x1f530000x4404000x440400c2fec7a4b7eb3b7ccbb6aa14dbf4df5funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x23940000x10000x1027dbaeaab71d07764c0fc5f35882153eFalse1.5GLS_BINARY_LSB_FIRST3.0IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_VERSION0x18170900x2c0data0.4303977272727273
                                                                                          RT_MANIFEST0x18173600xd53XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.38463793608912344
                                                                                          DLLImport
                                                                                          kernel32.dllGetModuleHandleA
                                                                                          ADVAPI32.dllEventActivityIdControl
                                                                                          bcrypt.dllBCryptCloseAlgorithmProvider
                                                                                          CRYPT32.dllPFXImportCertStore
                                                                                          IPHLPAPI.DLLif_nametoindex
                                                                                          ncrypt.dllNCryptImportKey
                                                                                          ole32.dllCoUninitialize
                                                                                          OLEAUT32.dllSysFreeString
                                                                                          Secur32.dllGetUserNameExW
                                                                                          USER32.dllLoadStringW
                                                                                          WS2_32.dllWSACleanup
                                                                                          NameOrdinalAddress
                                                                                          DotNetRuntimeDebugHeader10x1417032f0
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          EnglishUnited States
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 16, 2024 15:36:47.700249910 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:47.700290918 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:47.700529099 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:47.712620974 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:47.712644100 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:48.955244064 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:48.955527067 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:48.994520903 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:48.994545937 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:48.995486021 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:49.038739920 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:49.316700935 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:49.363323927 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:49.833451986 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:49.833679914 CET44349706104.26.0.5192.168.2.8
                                                                                          Dec 16, 2024 15:36:49.833810091 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:49.833985090 CET49706443192.168.2.8104.26.0.5
                                                                                          Dec 16, 2024 15:36:49.834003925 CET44349706104.26.0.5192.168.2.8
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 16, 2024 15:36:47.550312042 CET5150353192.168.2.81.1.1.1
                                                                                          Dec 16, 2024 15:36:47.692466974 CET53515031.1.1.1192.168.2.8
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Dec 16, 2024 15:36:47.550312042 CET192.168.2.81.1.1.10x8722Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Dec 16, 2024 15:36:47.692466974 CET1.1.1.1192.168.2.80x8722No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                                                          Dec 16, 2024 15:36:47.692466974 CET1.1.1.1192.168.2.80x8722No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                                                          Dec 16, 2024 15:36:47.692466974 CET1.1.1.1192.168.2.80x8722No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                                                          • keyauth.win
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.849706104.26.0.54434080C:\Users\user\Desktop\ak3o7AZ3mH.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-12-16 14:36:49 UTC140OUTPOST /api/1.0/ HTTP/1.1
                                                                                          Host: keyauth.win
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          Content-Length: 380
                                                                                          2024-12-16 14:36:49 UTC380OUTData Raw: 74 79 70 65 3d 36 39 36 65 36 39 37 34 26 76 65 72 3d 36 30 38 31 62 32 30 38 39 36 39 64 61 66 39 35 34 32 30 30 61 33 62 61 66 61 31 61 62 65 37 37 26 68 61 73 68 3d 34 37 63 31 32 39 36 30 34 64 61 61 63 32 39 39 39 66 34 31 61 61 39 39 64 35 63 34 63 32 34 30 26 65 6e 63 6b 65 79 3d 63 66 38 36 37 61 31 31 63 33 34 66 66 35 63 30 34 32 31 65 65 39 37 38 34 36 63 32 39 38 37 35 32 36 61 30 33 31 65 31 61 65 39 36 32 30 36 61 64 61 62 36 62 66 62 66 34 32 39 64 35 36 32 35 33 33 65 34 61 31 65 62 32 62 31 35 33 65 33 65 63 38 63 62 31 35 38 65 64 66 36 66 39 62 31 33 32 33 62 35 32 35 32 39 63 37 38 65 33 38 37 61 66 39 35 64 36 65 32 64 31 39 35 38 66 65 63 64 38 63 30 66 66 34 36 35 39 64 38 33 66 66 39 61 66 61 61 31 61 61 31 34 32 37 31 31 35 30 36
                                                                                          Data Ascii: type=696e6974&ver=6081b208969daf954200a3bafa1abe77&hash=47c129604daac2999f41aa99d5c4c240&enckey=cf867a11c34ff5c0421ee97846c2987526a031e1ae96206adab6bfbf429d562533e4a1eb2b153e3ec8cb158edf6f9b1323b52529c78e387af95d6e2d1958fecd8c0ff4659d83ff9afaa1aa142711506
                                                                                          2024-12-16 14:36:49 UTC1314INHTTP/1.1 200 OK
                                                                                          Date: Mon, 16 Dec 2024 14:36:49 GMT
                                                                                          Content-Type: text/plain;charset=UTF-8
                                                                                          Content-Length: 896
                                                                                          Connection: close
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HpIJkyrpOL7vI5ZiQWupEdw1EahxCEqNkeo6PDnlXXiAhvdHhowPj4xAhBEYY5wPFSspIhOALkOwxWNX3BuFBLq3ey5V%2BkGdE7170Ts5%2Fd4om7du4FeUqH5NHDjD"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Acknowledge: Credit to VaultCord.com
                                                                                          X-Powered-By: VaultCord.com
                                                                                          content-security-policy: upgrade-insecure-requests
                                                                                          permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                          strict-transport-security: max-age=31536000; includeSubDomains
                                                                                          x-content-security-policy: img-src *; media-src * data:;
                                                                                          x-content-type-options: nosniff
                                                                                          x-frame-options: DENY
                                                                                          x-xss-protection: 1; mode=block
                                                                                          Access-Control-Allow-Headers: *
                                                                                          Access-Control-Allow-Methods: *
                                                                                          Access-Control-Allow-Origin: *
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8f2f68693ef88c23-EWR
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1903&min_rtt=1890&rtt_var=735&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2344&recv_bytes=1156&delivery_rate=1461461&cwnd=227&unsent_bytes=0&cid=1c7f07a19cb6a22b&ts=895&x=0"
                                                                                          2024-12-16 14:36:49 UTC55INData Raw: 39 34 30 32 33 35 65 31 66 39 61 30 62 33 37 34 39 31 36 32 38 36 30 38 34 66 33 30 36 37 36 34 36 36 65 35 39 39 32 31 35 66 39 36 65 34 31 65 34 30 37 31 65 65 63
                                                                                          Data Ascii: 940235e1f9a0b374916286084f30676466e599215f96e41e4071eec
                                                                                          2024-12-16 14:36:49 UTC841INData Raw: 36 62 38 63 66 66 35 32 63 35 66 61 30 65 32 66 35 38 30 32 34 36 39 36 63 38 30 32 63 66 31 39 33 39 34 61 30 36 34 66 36 34 39 63 34 38 64 36 64 61 65 34 65 66 37 66 33 32 32 35 38 35 62 36 62 30 36 63 33 64 63 34 32 62 65 65 32 62 32 33 63 64 66 65 31 39 39 61 62 66 66 32 36 62 35 33 36 61 64 66 63 66 32 39 32 34 63 31 61 33 36 37 63 39 66 64 64 39 34 32 61 63 64 38 62 33 32 39 39 34 61 38 65 38 37 66 63 61 61 34 36 36 39 32 31 33 31 63 32 66 31 37 63 63 34 38 65 64 63 30 38 37 61 34 32 32 30 30 33 64 32 34 30 62 30 32 30 62 32 64 30 32 31 38 65 64 36 32 63 30 36 63 39 31 35 66 37 65 64 36 33 64 34 39 35 30 36 35 32 39 61 62 34 31 63 32 64 62 35 61 64 35 36 37 34 61 36 65 62 65 63 31 32 64 36 63 33 35 38 30 36 63 33 34 35 37 66 37 36 61 36 66 64 64 31
                                                                                          Data Ascii: 6b8cff52c5fa0e2f58024696c802cf19394a064f649c48d6dae4ef7f322585b6b06c3dc42bee2b23cdfe199abff26b536adfcf2924c1a367c9fdd942acd8b32994a8e87fcaa46692131c2f17cc48edc087a422003d240b020b2d0218ed62c06c915f7ed63d49506529ab41c2db5ad5674a6ebec12d6c35806c3457f76a6fdd1


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:09:36:43
                                                                                          Start date:16/12/2024
                                                                                          Path:C:\Users\user\Desktop\ak3o7AZ3mH.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Users\user\Desktop\ak3o7AZ3mH.exe"
                                                                                          Imagebase:0x7ff68ec80000
                                                                                          File size:18'362'384 bytes
                                                                                          MD5 hash:47C129604DAAC2999F41AA99D5C4C240
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Conti_ransomware, Description: Yara detected Conti ransomware, Source: 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Mimikatz_3, Description: Yara detected Mimikatz, Source: 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Conti_ransomware, Description: Yara detected Conti ransomware, Source: 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Mimikatz_3, Description: Yara detected Mimikatz, Source: 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:09:36:43
                                                                                          Start date:16/12/2024
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff6ee680000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:5
                                                                                          Start time:09:36:49
                                                                                          Start date:16/12/2024
                                                                                          Path:C:\Windows\System32\WerFault.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 4080 -s 1580
                                                                                          Imagebase:0x7ff7948a0000
                                                                                          File size:570'736 bytes
                                                                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          No disassembly