Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
Analysis ID:1428461
MD5:a4d2a484e1f0bf11169fda433a385f7f
SHA1:6733490679d6236a833d20390bc1e2d8ea88ed2e
SHA256:b2a55016c310fb3b6e38ea7dd08f6387c18c9eb2a4007947b43e6f1bb712c36e
Tags:exe
Infos:

Detection

Discord Token Stealer
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Discord Token Stealer
Found Tor onion address
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe (PID: 7496 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe" MD5: A4D2A484E1F0BF11169FDA433A385F7F)
    • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
    SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
    • 0x50ca34:$string1: SELECT origin_url, username_value, password_value FROM logins
    • 0x73d820:$string2: API call with %s database connection pointer
    • 0x73d8d8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
      00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
        Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe PID: 7496JoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
            0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
            • 0x50ca34:$string1: SELECT origin_url, username_value, password_value FROM logins
            • 0x73d820:$string2: API call with %s database connection pointer
            • 0x73d8d8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
            0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
              0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
              • 0x50ca34:$string1: SELECT origin_url, username_value, password_value FROM logins
              • 0x73d820:$string2: API call with %s database connection pointer
              • 0x73d8d8:$string3: os_win.c:%d: (%lu) %s(%s) - %s
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeReversingLabs: Detection: 20%
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: unixxn--bitsNameTypeasn1cx16sse2false<nil>ErrorchdirwritechmodchowncloseMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalOperaAmigoTorchGetDCBEGIN_auth_syncfile:1562578125int16int32int64uint8arrayslice and kind=defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]ntohs&amp;&#34;&#39;https:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFoundNRGBAparsexxxxxInts:Ptrs:GreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilsse41sse42ssse3matchrune tls: Earlyfilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nSHA-1P-224P-256P-384P-521ECDSA (at no IPClassStringFormat[]bytestringreadatremoveSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13minutesecondGOROOTChromeYandexKometaBitBltCOMMITNORMAL_mutexDOUBLE390625uint16uint32uint64structchan<-<-chan ValueGetACPsysmontimersefenceselect, not objectstatuslistensocketnumberactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectPragmasocks LockedRGBA64Gray16, val CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidirdtscppopcntcmd/gonetdnsempty rune1 X25519%w%.0wAcceptServerdomaingophertelnet.localreturn.onionip+netheaderAnswerLengthSTREETavx512rdrandrdseedfloat32float64readdirwriteatconsoleTuesdayJanuaryOctoberMUI_StdMUI_DltAPPDATADiscordChrome1Chrome2Chrome3Chrome4Chrome5Orbitumsqlite3DEFAULT_txlock_vacuum_cslikeDECIMAL19531259765625invaliduintptrSwapperChanDir using , type= Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitUNKNOWN:eventsCopySidWSARecvWSASendconnectDefaultnumber UpgradeTrailerHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTNRGBA64nil keyFloats:AvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaavx512fos/execruntimeInstAltInstNopalt -> nop -> any -> derivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharset\\.\UNCSHA-224SHA-256SHA-384SHA-512Ed25519MD2-RSAMD5-RSAserial:::ffff:no portanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsave#internGoStringtruncateFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOOpera GXDeleteDCROLLBACK_timeout_journal_locking48828125infinitystrconv.parsing ParseIntFuncTypestruct {nil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKno anodeCancelIoReadFileAcceptExWSAIoctlshutdownwsaioctlacceptex\Historybad insthijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0boundaryHTTP/1.1no-cacheContinueAcceptedConflictPaletted
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: unixxn--bitsNameTypeasn1cx16sse2false<nil>ErrorchdirwritechmodchowncloseMarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930monthLocalOperaAmigoTorchGetDCBEGIN_auth_syncfile:1562578125int16int32int64uint8arrayslice and kind=defersweeptestRtestWexecWexecRschedhchansudoggscanmheaptracepanicsleepgcingusagefault[...]ntohs&amp;&#34;&#39;https:***@Rangeallowrange:path%s %q%s=%sHTTP/socksFoundNRGBAparsexxxxxInts:Ptrs:GreekAdlamBamumBatakBuhidDograKhmerLatinLimbuNushuOghamOriyaOsageRunicTakriTamilsse41sse42ssse3matchrune tls: Earlyfilesimap2imap3imapspop3shostsutf-8%s*%dtext/bad nSHA-1P-224P-256P-384P-521ECDSA (at no IPClassStringFormat[]bytestringreadatremoveSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13minutesecondGOROOTChromeYandexKometaBitBltCOMMITNORMAL_mutexDOUBLE390625uint16uint32uint64structchan<-<-chan ValueGetACPsysmontimersefenceselect, not objectstatuslistensocketnumberactiveclosedsocks5CANCELGOAWAYPADDEDBasic CookieacceptcookieexpectoriginserverExpectPragmasocks LockedRGBA64Gray16, val CommonArabicBrahmiCarianChakmaCopticGothicHangulHatranHebrewKaithiKhojkiLepchaLycianLydianRejangSyriacTai_LeTangsaTangutTeluguThaanaWanchoYezidirdtscppopcntcmd/gonetdnsempty rune1 X25519%w%.0wAcceptServerdomaingophertelnet.localreturn.onionip+netheaderAnswerLengthSTREETavx512rdrandrdseedfloat32float64readdirwriteatconsoleTuesdayJanuaryOctoberMUI_StdMUI_DltAPPDATADiscordChrome1Chrome2Chrome3Chrome4Chrome5Orbitumsqlite3DEFAULT_txlock_vacuum_cslikeDECIMAL19531259765625invaliduintptrSwapperChanDir using , type= Value>ConvertforcegcallocmWcpuprofallocmRunknowngctraceIO waitUNKNOWN:eventsCopySidWSARecvWSASendconnectDefaultnumber UpgradeTrailerHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECTNRGBA64nil keyFloats:AvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaavx512fos/execruntimeInstAltInstNopalt -> nop -> any -> derivedInitialExpiresSubjectwindowswsarecvwsasendlookup writetocharset\\.\UNCSHA-224SHA-256SHA-384SHA-512Ed25519MD2-RSAMD5-RSAserial:::ffff:no portanswers2.5.4.62.5.4.32.5.4.52.5.4.72.5.4.82.5.4.9amxtileamxint8amxbf16osxsave#internGoStringtruncateFullPathThursdaySaturdayFebruaryNovemberDecember%!Month(ZONEINFOOpera GXDeleteDCROLLBACK_timeout_journal_locking48828125infinitystrconv.parsing ParseIntFuncTypestruct {nil PoolscavengepollDesctraceBufdeadlockraceFinipanicnilcgocheck is not pointerBAD RANKno anodeCancelIoReadFileAcceptExWSAIoctlshutdownwsaioctlacceptex\Historybad insthijackedNO_ERRORPRIORITYSETTINGSLocation data=%q incr=%v ping=%qif-matchlocationhttp/1.1HTTP/2.0boundaryHTTP/1.1no-cacheContinueAcceptedConflictPaletted
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: https://discord.com/api/v9/users/
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C0000D4000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17C:
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://www.ecosia.org/newtab/
              Source: Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

              System Summary

              barindex
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Number of sections : 11 > 10
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
              Source: classification engineClassification label: mal72.troj.spyw.evad.winEXE@2/19@0/0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile created: C:\Users\user\Desktop\discord.jsonJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7504:120:WilError_03
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Windows\system32\a65c24af649f2140c98023ea80f2c47f38ae2a60d7b9767b76fdb7de8fb981d2AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeBinary or memory string: SELECT tab_url, target_path FROM downloadslooking for beginning of object key stringmix of request and response pseudo headersPRIORITY frame payload size was %d; want 5http: multipart handled by MultipartReaderhttp: ContentLength=%d with Body length %d Rectang
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1676784459.0000024B5E2BE000.00000004.00000020.00020000.00000000.sdmp, Login DatapomdOhjfeW.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeReversingLabs: Detection: 20%
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: text offset out
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: text offset out
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: ocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: sudog with non-nil wait
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeString found in binary or memory: ocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: sudog with non-nil wait
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeSection loaded: cryptbase.dllJump to behavior
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic file information: File size 7870976 > 1048576
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x40d400
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x2f9800
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeStatic PE information: section name: .xdata
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1684978369.0000024B5E28E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe PID: 7496, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataifXQjhqTfOJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryncVxcrHRZzJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 1Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesyonHaWuppHJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DatapomdOhjfeWJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 5Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 4Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistorymUUcKURTZnJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 3Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Profile 2Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataFIHJDMqXHmJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DatamiROCwylnOJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryAWSFNvLGNrJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesPsjkPAcRusJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryqCoKrzsSGrJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe.7ff7d5bd0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe PID: 7496, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Process Injection
              1
              Masquerading
              1
              OS Credential Dumping
              1
              Security Software Discovery
              Remote Services1
              Data from Local System
              1
              Proxy
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Process Injection
              LSASS Memory11
              System Information Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              DLL Side-Loading
              Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe21%ReversingLabsWin64.Trojan.GenSteal
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://ac.ecosia.org/autocomplete?q=Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                high
                https://duckduckgo.com/chrome_newtabWeb DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                  high
                  https://duckduckgo.com/ac/?q=Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoWeb DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                      high
                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallSecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.drfalse
                        high
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWeb DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                          high
                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17C:SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://discord.com/api/v9/users/SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exefalse
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                                  high
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C0000D4000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.drfalse
                                    high
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesSecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677307275.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000003.1677378269.0000024B5E2D5000.00000004.00000020.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.drfalse
                                      high
                                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, 00000000.00000002.1681861352.000000C00008E000.00000004.00001000.00020000.00000000.sdmp, HistoryncVxcrHRZz.0.dr, HistoryAWSFNvLGNr.0.dr, history.json.0.drfalse
                                        high
                                        https://www.ecosia.org/newtab/Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                                          high
                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Web DataFIHJDMqXHm.0.dr, Web DatamiROCwylnO.0.drfalse
                                            high
                                            No contacted IP infos
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1428461
                                            Start date and time:2024-04-19 00:39:07 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 2m 56s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:2
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            Detection:MAL
                                            Classification:mal72.troj.spyw.evad.winEXE@2/19@0/0
                                            EGA Information:Failed
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Stop behavior analysis, all processes terminated
                                            • Execution Graph export aborted for target SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe, PID 7496 because there are no executed function
                                            • Not all processes where analyzed, report is missing behavior information
                                            • VT rate limit hit for: SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            No simulations
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                            Category:dropped
                                            Size (bytes):159744
                                            Entropy (8bit):0.7873599747470391
                                            Encrypted:false
                                            SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                            MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                            SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                            SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                            SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                            Category:dropped
                                            Size (bytes):159744
                                            Entropy (8bit):0.7873599747470391
                                            Encrypted:false
                                            SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                            MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                            SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                            SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                            SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):40960
                                            Entropy (8bit):0.8553638852307782
                                            Encrypted:false
                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                            Category:dropped
                                            Size (bytes):28672
                                            Entropy (8bit):2.5793180405395284
                                            Encrypted:false
                                            SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                            MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                            SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                            SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                            SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                            Category:dropped
                                            Size (bytes):106496
                                            Entropy (8bit):1.1358696453229276
                                            Encrypted:false
                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                            MD5:28591AA4E12D1C4FC761BE7C0A468622
                                            SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                            SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                            SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                            Category:dropped
                                            Size (bytes):106496
                                            Entropy (8bit):1.1358696453229276
                                            Encrypted:false
                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                            MD5:28591AA4E12D1C4FC761BE7C0A468622
                                            SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                            SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                            SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):126976
                                            Entropy (8bit):0.47147045728725767
                                            Encrypted:false
                                            SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                            MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                            SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                            SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                            SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):126976
                                            Entropy (8bit):0.47147045728725767
                                            Encrypted:false
                                            SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                            MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                            SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                            SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                            SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                            Malicious:true
                                            Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):49152
                                            Entropy (8bit):0.8180424350137764
                                            Encrypted:false
                                            SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                            MD5:349E6EB110E34A08924D92F6B334801D
                                            SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                            SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                            SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                            Malicious:false
                                            Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):114688
                                            Entropy (8bit):0.9746603542602881
                                            Encrypted:false
                                            SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                            MD5:780853CDDEAEE8DE70F28A4B255A600B
                                            SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                            SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                            SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):114688
                                            Entropy (8bit):0.9746603542602881
                                            Encrypted:false
                                            SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                            MD5:780853CDDEAEE8DE70F28A4B255A600B
                                            SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                            SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                            SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):1.5
                                            Encrypted:false
                                            SSDEEP:3:s:s
                                            MD5:37A6259CC0C1DAE299A7866489DFF0BD
                                            SHA1:2BE88CA4242C76E8253AC62474851065032D6833
                                            SHA-256:74234E98AFE7498FB5DAF1F36AC2D78ACC339464F950703B8C019892F982B90B
                                            SHA-512:04F8FF2682604862E405BF88DE102ED7710AC45C1205957625E4EE3E5F5A2241E453614ACC451345B91BAFC88F38804019C7492444595674E94E8CF4BE53817F
                                            Malicious:false
                                            Preview:null
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):1.5
                                            Encrypted:false
                                            SSDEEP:3:s:s
                                            MD5:37A6259CC0C1DAE299A7866489DFF0BD
                                            SHA1:2BE88CA4242C76E8253AC62474851065032D6833
                                            SHA-256:74234E98AFE7498FB5DAF1F36AC2D78ACC339464F950703B8C019892F982B90B
                                            SHA-512:04F8FF2682604862E405BF88DE102ED7710AC45C1205957625E4EE3E5F5A2241E453614ACC451345B91BAFC88F38804019C7492444595674E94E8CF4BE53817F
                                            Malicious:false
                                            Preview:null
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:JSON data
                                            Category:dropped
                                            Size (bytes):6297
                                            Entropy (8bit):5.260756364131826
                                            Encrypted:false
                                            SSDEEP:192:ENl1q+RTfXhJ+ZyddC0oSJcPKovRInrx7:ETA+dfXhJ+ZyjC0oSJcPKovRInrx7
                                            MD5:CFC86D76F6DFD03FCF2774D8C95713AF
                                            SHA1:202AEFA0D267810ABAB529648F578E91FD098681
                                            SHA-256:392D8AC474964CEAB400A6AB18F8096F000CE92CAC54E6F48303D516446D1555
                                            SHA-512:FE624E0FC4FEDDD1FFCD8A3776EF6787F08181B319540013AC6B5907ACA40EBCDEF09CBF10746C7EFC3C0F81C43259A0C9E2400F7C357BC80FA13406B2EF8B8D
                                            Malicious:false
                                            Preview:[. {. "tab_url": ".google.com",. "name": "NID",. "path": "/",. "encrypted_value": "511=j8SQUTltnVU5cOAeyzqSxW-qHOakRuBHDQGLTGeceC9Z5rRzk5trMKb4CuZC_CFmc7KFwQcRJL-qGz8MvkkzMZmElvXAFWLO-TPZ9PMqBYA78ZAuaepnXIRHe-TAolVoW6Z7dQnqpgyX0m-TmS72bebAgoqZv5GkpRFUcZIw1Kk",. "expires_utc": "13356618603686193". },. {. "tab_url": "support.microsoft.com",. "name": ".AspNetCore.AuthProvider",. "path": "/",. "encrypted_value": "True",. "expires_utc": "13340887435186329". },. {. "tab_url": "support.microsoft.com",. "name": ".AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU",. "path": "/signin-oidc",. "encrypted_value": "N",. "expires_utc": "13340887735359381". },. {. "tab_url": "support.microsoft.com",. "name": ".AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltv
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):1.5
                                            Encrypted:false
                                            SSDEEP:3:s:s
                                            MD5:37A6259CC0C1DAE299A7866489DFF0BD
                                            SHA1:2BE88CA4242C76E8253AC62474851065032D6833
                                            SHA-256:74234E98AFE7498FB5DAF1F36AC2D78ACC339464F950703B8C019892F982B90B
                                            SHA-512:04F8FF2682604862E405BF88DE102ED7710AC45C1205957625E4EE3E5F5A2241E453614ACC451345B91BAFC88F38804019C7492444595674E94E8CF4BE53817F
                                            Malicious:false
                                            Preview:null
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):1.5
                                            Encrypted:false
                                            SSDEEP:3:s:s
                                            MD5:37A6259CC0C1DAE299A7866489DFF0BD
                                            SHA1:2BE88CA4242C76E8253AC62474851065032D6833
                                            SHA-256:74234E98AFE7498FB5DAF1F36AC2D78ACC339464F950703B8C019892F982B90B
                                            SHA-512:04F8FF2682604862E405BF88DE102ED7710AC45C1205957625E4EE3E5F5A2241E453614ACC451345B91BAFC88F38804019C7492444595674E94E8CF4BE53817F
                                            Malicious:false
                                            Preview:null
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:JSON data
                                            Category:dropped
                                            Size (bytes):1317
                                            Entropy (8bit):5.064791427060137
                                            Encrypted:false
                                            SSDEEP:24:fT1boh9wG5bpjRmZDl1mJbpjRSpDl1mMQTkboPpIbpjRVp7mJbpjOSbp7mJg:f4wGvVcDl1mfVuDl1mVhpOVVp7mfScpf
                                            MD5:4E04955DF6D1EA845ECF6B7CF64B2024
                                            SHA1:38E78DF66C2A26E2648277E1BCBD62061D60565E
                                            SHA-256:34FFE9A6D5CB18AD8D6A7D3A88817ED5338E4BA823B6A938121E19D95D56FE0A
                                            SHA-512:BD6F7EEE95CF6085E5B95B1A45AEEDDCFD4095461E2922D215C513EFD78D584F78B424DF54D9B7AA81AC3B15A10B7D7819A8477D71BD5B254D5932187A4A0B20
                                            Malicious:false
                                            Preview:[. {. "url": "https://go.microsoft.com/fwlink/?linkid=851546",. "visit_count": "2". },. {. "url": "https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016",. "visit_count": "2". },. {. "url": "https://support.microsoft.com/en-us/office/7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016\u0026ui=en-us\u0026rs=en-us\u0026ad=us",. "visit_count": "2". },. {. "url": "https://support.microsoft.com/en-us/office/examples-of-office-product-keys-7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016\u0026ui=en-us\u0026rs=en-us\u0026ad=us",. "visit_count": "1". },. {. "url": "https://go.microsoft.com/fwlink/?LinkId=2106243",. "visit_count": "2". },. {. "url": "https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17",. "visit_count": "2". },. {. "url": "https://support.microsoft.com/en-us/office/94ba2e0b-638e
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):1.5
                                            Encrypted:false
                                            SSDEEP:3:s:s
                                            MD5:37A6259CC0C1DAE299A7866489DFF0BD
                                            SHA1:2BE88CA4242C76E8253AC62474851065032D6833
                                            SHA-256:74234E98AFE7498FB5DAF1F36AC2D78ACC339464F950703B8C019892F982B90B
                                            SHA-512:04F8FF2682604862E405BF88DE102ED7710AC45C1205957625E4EE3E5F5A2241E453614ACC451345B91BAFC88F38804019C7492444595674E94E8CF4BE53817F
                                            Malicious:false
                                            Preview:null
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File Type:PNG image data, 1280 x 1024, 8-bit/color RGB, non-interlaced
                                            Category:dropped
                                            Size (bytes):5972
                                            Entropy (8bit):2.965214914712565
                                            Encrypted:false
                                            SSDEEP:96:hzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzze:hzzzzzzzzzzzzzzzzzzzzzzzzzzzzzze
                                            MD5:D147516C6D2B7D9CAD27C9FFF5CCB5AA
                                            SHA1:61DCA9BB30FC7DC8AAB1DFC7A1644D69556D8222
                                            SHA-256:104DC9793E23455F049D08D64E547331BE2626C8AB6E9083B8D9BFD1E38E7D0C
                                            SHA-512:A23B84F061EA78A11A009CE56B853C68B0F6E51A546D797C577C3F7A78B684A276C36B970F9BD6538F40D88C62951435A368D9D9D5A46C8100A1BE71969534A1
                                            Malicious:false
                                            Preview:.PNG........IHDR.............1.c.....IDATx.........!........... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........@...... ....$.0........
                                            File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                            Entropy (8bit):6.2115267323300944
                                            TrID:
                                            • Win64 Executable (generic) (12005/4) 74.95%
                                            • Generic Win/DOS Executable (2004/3) 12.51%
                                            • DOS Executable Generic (2002/1) 12.50%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                            File name:SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            File size:7'870'976 bytes
                                            MD5:a4d2a484e1f0bf11169fda433a385f7f
                                            SHA1:6733490679d6236a833d20390bc1e2d8ea88ed2e
                                            SHA256:b2a55016c310fb3b6e38ea7dd08f6387c18c9eb2a4007947b43e6f1bb712c36e
                                            SHA512:f3d904b7e60163a89be944fc99b68438120ced7e5c655da99507b5b06d93f530aa82d4355e4b88862ea3c1ab3ac15d8d92e89c973964ee439a083242bcbd335b
                                            SSDEEP:98304:7GbT/vHJURAs+Flc2MuwWXD0SOi7aEh8D:7GZUus+FYHWTzHi
                                            TLSH:3B863A47E8A541E8C0AED1348A639263BA717C481B3427D72B60F7382F76FD0AE79754
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................'..@...x................@......................................y...`... ............................
                                            Icon Hash:90cececece8e8eb0
                                            Entrypoint:0x1400013f0
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x140000000
                                            Subsystem:windows cui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                            TLS Callbacks:0x4040c940, 0x1, 0x4040c910, 0x1
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:1
                                            File Version Major:6
                                            File Version Minor:1
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:1
                                            Import Hash:9848d2dcb193b1c689991b27006bc941
                                            Instruction
                                            dec eax
                                            sub esp, 28h
                                            dec eax
                                            mov eax, dword ptr [0074FC45h]
                                            mov dword ptr [eax], 00000000h
                                            call 00007F41B100F38Fh
                                            nop
                                            nop
                                            dec eax
                                            add esp, 28h
                                            ret
                                            nop dword ptr [eax]
                                            dec eax
                                            sub esp, 28h
                                            call 00007F41B141BF9Ch
                                            dec eax
                                            cmp eax, 01h
                                            sbb eax, eax
                                            dec eax
                                            add esp, 28h
                                            ret
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            dec eax
                                            lea ecx, dword ptr [00000009h]
                                            jmp 00007F41B100F5E9h
                                            nop dword ptr [eax+00h]
                                            ret
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop
                                            nop word ptr [eax+eax+00000000h]
                                            nop word ptr [eax+eax+00h]
                                            dec esp
                                            lea esp, dword ptr [esp-000000C0h]
                                            dec ebp
                                            cmp esp, dword ptr [esi+10h]
                                            jbe 00007F41B100F869h
                                            push ebp
                                            dec eax
                                            mov ebp, esp
                                            dec eax
                                            sub esp, 00000138h
                                            dec eax
                                            mov dword ptr [esp+00000148h], eax
                                            call 00007F41B10485ABh
                                            dec eax
                                            lea eax, dword ptr [004F7E2Eh]
                                            mov ebx, 00000005h
                                            call 00007F41B1048AFAh
                                            nop dword ptr [eax+eax+00h]
                                            call 00007F41B10485F0h
                                            dec eax
                                            mov eax, dword ptr [esp+00000148h]
                                            dec eax
                                            mov ecx, dword ptr [eax]
                                            dec eax
                                            mov dword ptr [esp+00000098h], ecx
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x8030000x159.edata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8040000x1ab0.idata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7520000x1a25c.pdata
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8080000xf144.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x750c800x28.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x8046440x568.idata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x40d2700x40d40076314f13b1738851d8e217fde1e97e9cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .data0x40f0000x485e00x48600094bce36c9edb61358b75eb16f74f97eFalse0.39078017055267705data5.051467623871148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rdata0x4580000x2f97400x2f9800290222823e0865cbb684d95caf38a5d9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .pdata0x7520000x1a25c0x1a40024b6a54ab99e002c122ec5b87123f4c8False0.42784598214285713data5.81195122922775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .xdata0x76d0000x6b040x6c002d44fa57553fdae2a479fa08de18dccdFalse0.16030092592592593data4.566128546826554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .bss0x7740000x8e5400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .edata0x8030000x1590x20062c1de4b64d75a6f1ce40864905a3383False0.423828125data3.740859929334406IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .idata0x8040000x1ab00x1c00cd9a182fb02e539883096e386da83879False0.29715401785714285data4.4243917545920395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .CRT0x8060000x600x2003d16b03d335f1618fece2690fac33913False0.06640625data0.2990238586730518IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .tls0x8070000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0x8080000xf1440xf2007313ee5b9a113f079e891d51a353aa06False0.2539223915289256data5.436757937146287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            DLLImport
                                            KERNEL32.dllAddVectoredContinueHandler, AddVectoredExceptionHandler, AreFileApisANSI, CloseHandle, CreateEventA, CreateFileA, CreateFileMappingW, CreateFileW, CreateIoCompletionPort, CreateMutexW, CreateThread, CreateWaitableTimerA, CreateWaitableTimerExW, DeleteCriticalSection, DeleteFileA, DeleteFileW, DuplicateHandle, EnterCriticalSection, ExitProcess, FlushFileBuffers, FlushViewOfFile, FormatMessageA, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceA, GetDiskFreeSpaceW, GetEnvironmentStringsW, GetErrorMode, GetFileAttributesA, GetFileAttributesExW, GetFileAttributesW, GetFileSize, GetFullPathNameA, GetFullPathNameW, GetLastError, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetQueuedCompletionStatusEx, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetTempPathA, GetTempPathW, GetThreadContext, GetTickCount, HeapAlloc, HeapCompact, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, HeapValidate, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, LocalFree, LockFile, LockFileEx, MapViewOfFile, MultiByteToWideChar, OutputDebugStringA, OutputDebugStringW, PostQueuedCompletionStatus, QueryPerformanceCounter, RaiseFailFastException, ReadFile, ResumeThread, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetEndOfFile, SetErrorMode, SetEvent, SetFilePointer, SetProcessPriorityBoost, SetThreadContext, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TryEnterCriticalSection, UnlockFile, UnlockFileEx, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                                            api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron
                                            api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                            api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr
                                            api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _beginthread, _beginthreadex, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal
                                            api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, fwrite
                                            api-ms-win-crt-string-l1-1-0.dllmemset, strcmp, strcspn, strlen, strncmp, strspn
                                            api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _localtime64, _tzset
                                            api-ms-win-crt-utility-l1-1-0.dllqsort
                                            NameOrdinalAddress
                                            _cgo_dummy_export10x140802370
                                            authorizerTrampoline20x14031d9e0
                                            callbackTrampoline30x14031d730
                                            commitHookTrampoline40x14031d8c0
                                            compareTrampoline50x14031d830
                                            doneTrampoline60x14031d7f0
                                            preUpdateHookTrampoline70x14031da70
                                            rollbackHookTrampoline80x14031d920
                                            stepTrampoline90x14031d790
                                            updateHookTrampoline100x14031d960
                                            No network behavior found

                                            Click to jump to process

                                            Click to jump to process

                                            Click to jump to process

                                            Target ID:0
                                            Start time:00:39:58
                                            Start date:19/04/2024
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24850.22028.exe"
                                            Imagebase:0x7ff7d5bd0000
                                            File size:7'870'976 bytes
                                            MD5 hash:A4D2A484E1F0BF11169FDA433A385F7F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:Go lang
                                            Yara matches:
                                            • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 00000000.00000002.1687801774.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 00000000.00000000.1674596432.00007FF7D6028000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:00:39:58
                                            Start date:19/04/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            No disassembly