Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe

Overview

General Information

Sample name:SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe
Analysis ID:1665804
MD5:2191df558e41b894bb7de46b73d22b04
SHA1:517965b53c86831cd88dad1c63653e347e442f53
SHA256:40f5ae4aaa26d50dd35cbb46a252ab16314af9c0957d8ac7ca62c2f8a6497c0a
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe PID: 3840JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\Desktop\Overlunky.exeReversingLabs: Detection: 22%
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeReversingLabs: Detection: 22%
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeVirustotal: Detection: 22%Perma Link
    Source: unknownHTTPS traffic detected: 140.82.112.4:443 -> 192.168.2.4:49711 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.4:49712 version: TLS 1.2
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D421E0 ?fail@ios_base@std@@QEBA_NXZ,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF6A5D421E0
    Source: Joe Sandbox ViewIP Address: 140.82.112.4 140.82.112.4
    Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
    Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D136D0 InternetGetConnectedState,InternetOpenA,lstrlenA,InternetOpenUrlA,remove,rename,__acrt_iob_func,fflush,__acrt_iob_func,fflush,fopen_s,InternetCloseHandle,__acrt_iob_func,fflush,__acrt_iob_func,__acrt_iob_func,fflush,__acrt_iob_func,__acrt_iob_func,fflush,__acrt_iob_func,InternetCloseHandle,__acrt_iob_func,fflush,__acrt_iob_func,fflush,HttpQueryInfoA,InternetReadFile,fwrite,InternetReadFile,fwrite,fflush,fclose,InternetCloseHandle,fclose,InternetCloseHandle,__acrt_iob_func,fflush,__acrt_iob_func,0_2_00007FF6A5D136D0
    Source: global trafficHTTP traffic detected: GET /spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll HTTP/1.1Accept: */*User-Agent: Overlunky UpdaterHost: github.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/311203851/4c20cd6b-9a4f-404f-ade4-198a3c7ba37e?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250415%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250415T191913Z&X-Amz-Expires=300&X-Amz-Signature=68173c69b20cb01feb7ec9c1f6df168b384c29de5975c18bacffbf8bccc4a058&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DOverlunky.dll&response-content-type=application%2Foctet-stream HTTP/1.1Accept: */*User-Agent: Overlunky UpdaterCache-Control: no-cacheHost: objects.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe HTTP/1.1Accept: */*User-Agent: Overlunky UpdaterHost: github.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/311203851/d7b11efa-8940-401f-808f-e581f33bea1b?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250415%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250415T191924Z&X-Amz-Expires=300&X-Amz-Signature=cdcc470fcb3f80e87f9edeefb924c29916eb519192931a5838d21c72df5391b9&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DOverlunky.exe&response-content-type=application%2Foctet-stream HTTP/1.1Accept: */*User-Agent: Overlunky UpdaterCache-Control: no-cacheHost: objects.githubusercontent.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: github.com
    Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: http://github.com/kikito/inspect.lua
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: http://scripts.sil.org/cms/scripts/page.php?site_id=nrsi&id=iws-appendixa
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: http://www.dearimgui.org/faq/
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: http://www.dearimgui.org/faq/ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-._~%
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: https://api.github.com/repos/spelunky-fyi/overlunky/git/ref/tags/whip
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624491053.0000016B67B6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/p
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: https://github.com/spelunky-fyi/overlunky#overlunky
    Source: Overlunky.exe.0.drString found in binary or memory: https://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll3
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, Overlunky.exe.0.drString found in binary or memory: https://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, Overlunky.exe.0.drString found in binary or memory: https://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe../Spel2.exetrueupdate
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: https://github.com/spelunky-fyi/overlunky/releases/tag/whip
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/y
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170316193.0000016B67BFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170185282.0000016B67BF8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170316193.0000016B67BFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/_
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463867505.0000016B67C2D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463932641.0000016B67C3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3625112771.0000016B67C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/github-production-
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170409408.0000016B67C4C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463932641.0000016B67C3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3625112771.0000016B67C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/311203851/4c20cd6b-9a4f
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/311203851/d7b11efa-8940
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170185282.0000016B67BF8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.1170316193.0000016B67BFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/o
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: https://spelunky-fyi.github.io/overlunky/
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmp, Overlunky.dll.0.drString found in binary or memory: https://spelunky-fyi.github.io/overlunky/Read
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
    Source: unknownHTTPS traffic detected: 140.82.112.4:443 -> 192.168.2.4:49711 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.4:49712 version: TLS 1.2
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3628948650.00007FFC9B62F000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_0b8d1242-7
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe PID: 3840, type: MEMORYSTR
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D16F200_2_00007FF6A5D16F20
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D112900_2_00007FF6A5D11290
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D1B2500_2_00007FF6A5D1B250
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D297000_2_00007FF6A5D29700
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3E7000_2_00007FF6A5D3E700
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3C6F00_2_00007FF6A5D3C6F0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D2A6D00_2_00007FF6A5D2A6D0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D306600_2_00007FF6A5D30660
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3D6000_2_00007FF6A5D3D600
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3D0D00_2_00007FF6A5D3D0D0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3A0000_2_00007FF6A5D3A000
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D257F00_2_00007FF6A5D257F0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3D7D00_2_00007FF6A5D3D7D0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D327900_2_00007FF6A5D32790
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D1AF700_2_00007FF6A5D1AF70
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D33A900_2_00007FF6A5D33A90
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3AA000_2_00007FF6A5D3AA00
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D421E00_2_00007FF6A5D421E0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D2A9B00_2_00007FF6A5D2A9B0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D379B00_2_00007FF6A5D379B0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D409700_2_00007FF6A5D40970
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D401400_2_00007FF6A5D40140
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D295000_2_00007FF6A5D29500
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3ECF00_2_00007FF6A5D3ECF0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D384900_2_00007FF6A5D38490
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D14C400_2_00007FF6A5D14C40
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3A4300_2_00007FF6A5D3A430
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D3AB800_2_00007FF6A5D3AB80
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: String function: 00007FF6A5D28400 appears 58 times
    Source: classification engineClassification label: mal56.winEXE@2/3@2/2
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D24220 CreateToolhelp32Snapshot,memset,Process32First,Process32Next,strrchr,strlen,memcpy,memcpy,_invalid_parameter_noinfo_noreturn,__std_terminate,0_2_00007FF6A5D24220
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeFile created: C:\Users\user\Desktop\Overlunky.dllJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:352:120:WilError_03
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeReversingLabs: Detection: 22%
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeVirustotal: Detection: 22%
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --inject use the old injection method instead of Detours with --launch_game
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --inject use the old injection method instead of Detours with --launch_game
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [panic] Injecting failed, maybe you should try --launch_game instead...
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Injecting failed, maybe you should try --launch_game instead...
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with Detours
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Already injected, let's not do that again. If you want to inject multiple game processes, use the --launch_game parameter.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with Detours
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Without --launch_game the launcher will search for a process called Spel2.exe and inject OL when found.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Already injected, let's not do that again. If you want to inject multiple game processes, use the --launch_game parameter.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Without --launch_game the launcher will search for a process called Spel2.exe and inject OL when found.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Without --launch_game the launcher will search for a process called Spel2.exe and inject OL when found.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --inject use the old injection method instead of Detours with --launch_game
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with Detours
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [panic] Injecting failed, maybe you should try --launch_game instead...
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Already injected, let's not do that again. If you want to inject multiple game processes, use the --launch_game parameter.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with Detours
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception: --inject use the old injection method instead of Detours with --launch_game
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Already injected, let's not do that again. If you want to inject multiple game processes, use the --launch_game parameter.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Without --launch_game the launcher will search for a process called Spel2.exe and inject OL when found.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: Formatting exception:Injecting failed, maybe you should try --launch_game instead...
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with Detours
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --help show this helpful help
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] --inject use the old injection method instead of Detours with --launch_game
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Already injected, let's not do that again. If you want to inject multiple game processes, use the --launch_game parameter.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [info] Without --launch_game the launcher will search for a process called Spel2.exe and inject OL when found.
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: [panic] Injecting failed, maybe you should try --launch_game instead...
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: {}{}Formatting exception:Cannot find the address of the library in current process: {}Formatting exception:Cannot find library in the target process: {}Formatting exception:Overlunky DLL version: {}Formatting exception:Overlunky EXE version: {}Formatting exception:Found Spel2.exe PID: {}Formatting exception:Cannot find the address of the function in current process: {} :: {}Formatting exception:Injecting DLL into process... {}Formatting exception:Launching game... {}Formatting exception:Launching game with DLL... {}Formatting exception:DLL not found! {}Formatting exception:Allocation failed: {:#x}OverlunkyImagehlpApiVersionExbad castformat specifier requires numeric argumentFormatting exception:AutoUpdate: Can't connect to the internetinjectFormatting exception: --oldflip launch the game with -oldflip, may improve performance with external windowsstatusexistsFormatting exception: --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with DetoursSymSetOptionsSymGetOptions%s:%d: assertion failed: %s.detourOverlunky Updaterunknown format specifierinvalid format specifierupdate_launcherprecision is not integerwidth is not integerinvalid format specifier for charinfo_dumpFormatting exception: --help show this helpful helpoldflipUnknown exceptioninvalid string positionFormatting exception: --version show version informationdll_versionOverlunky.versionnegative precisioninvalid precision_CorExeMainnansystemstring pointer is null\Overlunky.dllhttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll\info_dump.dllcanonicalbad array new lengthnegative widthvector too longstring too longcannot switch from automatic to manual argument indexingcannot switch from manual to automatic argument indexingmissing '}' in format stringunmatched '}' in format stringinvalid format stringnumber is too biginf0123456789abcdefSymInitializehttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe../Spel2.exetrueupdateOverlunky UpdatefalseFormatting exception: --inject use the old injection method instead of Detours with --launch_gameSymFromNameconsoleFormatting exception:AutoUpdate: Can't write new filecannot write to fileargument not foundOverlunky.dll.oldOverlunky.exe.oldFormatting exception: --update_launcher update launcher to the latest WHIP buildFormatting exception: --update reset AutoUpdate setting and update launcher and DLL to the latest WHIP buildFormatting exception:DLL injecteddisabledFormatting exception: --console keep console open to debug scripts etcgenericwbFormatting exception:AutoUpdate: Can't connect to githubFormatting exception:AutoUpdate: Can't get version information from githubFormatting exception:AutoUpdate: Can't get release information from githubFormatting exception:AutoUpdate: Can't read file from githubWINDIRNANFormatting exception:Game launched with DLLFormatting
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: {}{}Formatting exception:Cannot find the address of the library in current process: {}Formatting exception:Cannot find library in the target process: {}Formatting exception:Overlunky DLL version: {}Formatting exception:Overlunky EXE version: {}Formatting exception:Found Spel2.exe PID: {}Formatting exception:Cannot find the address of the function in current process: {} :: {}Formatting exception:Injecting DLL into process... {}Formatting exception:Launching game... {}Formatting exception:Launching game with DLL... {}Formatting exception:DLL not found! {}Formatting exception:Allocation failed: {:#x}OverlunkyImagehlpApiVersionExbad castformat specifier requires numeric argumentFormatting exception:AutoUpdate: Can't connect to the internetinjectFormatting exception: --oldflip launch the game with -oldflip, may improve performance with external windowsstatusexistsFormatting exception: --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with DetoursSymSetOptionsSymGetOptions%s:%d: assertion failed: %s.detourOverlunky Updaterunknown format specifierinvalid format specifierupdate_launcherprecision is not integerwidth is not integerinvalid format specifier for charinfo_dumpFormatting exception: --help show this helpful helpoldflipUnknown exceptioninvalid string positionFormatting exception: --version show version informationdll_versionOverlunky.versionnegative precisioninvalid precision_CorExeMainnansystemstring pointer is null\Overlunky.dllhttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll\info_dump.dllcanonicalbad array new lengthnegative widthvector too longstring too longcannot switch from automatic to manual argument indexingcannot switch from manual to automatic argument indexingmissing '}' in format stringunmatched '}' in format stringinvalid format stringnumber is too biginf0123456789abcdefSymInitializehttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe../Spel2.exetrueupdateOverlunky UpdatefalseFormatting exception: --inject use the old injection method instead of Detours with --launch_gameSymFromNameconsoleFormatting exception:AutoUpdate: Can't write new filecannot write to fileargument not foundOverlunky.dll.oldOverlunky.exe.oldFormatting exception: --update_launcher update launcher to the latest WHIP buildFormatting exception: --update reset AutoUpdate setting and update launcher and DLL to the latest WHIP buildFormatting exception:DLL injecteddisabledFormatting exception: --console keep console open to debug scripts etcgenericwbFormatting exception:AutoUpdate: Can't connect to githubFormatting exception:AutoUpdate: Can't get version information from githubFormatting exception:AutoUpdate: Can't get release information from githubFormatting exception:AutoUpdate: Can't read file from githubWINDIRNANFormatting exception:Game launched with DLLFormatting
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeString found in binary or memory: {}{}Formatting exception:Cannot find the address of the library in current process: {}Formatting exception:Cannot find library in the target process: {}Formatting exception:Overlunky DLL version: {}Formatting exception:Overlunky EXE version: {}Formatting exception:Found Spel2.exe PID: {}Formatting exception:Cannot find the address of the function in current process: {} :: {}Formatting exception:Injecting DLL into process... {}Formatting exception:Launching game... {}Formatting exception:Launching game with DLL... {}Formatting exception:DLL not found! {}Formatting exception:Allocation failed: {:#x}OverlunkyImagehlpApiVersionExbad castformat specifier requires numeric argumentFormatting exception:AutoUpdate: Can't connect to the internetinjectFormatting exception: --oldflip launch the game with -oldflip, may improve performance with external windowsstatusexistsFormatting exception: --launch_game [path] launch ../Spel2.exe, path/Spel2.exe, or a specific exe, and load OL with DetoursSymSetOptionsSymGetOptions%s:%d: assertion failed: %s.detourOverlunky Updaterunknown format specifierinvalid format specifierupdate_launcherprecision is not integerwidth is not integerinvalid format specifier for charinfo_dumpFormatting exception: --help show this helpful helpoldflipUnknown exceptioninvalid string positionFormatting exception: --version show version informationdll_versionOverlunky.versionnegative precisioninvalid precision_CorExeMainnansystemstring pointer is null\Overlunky.dllhttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.dll\info_dump.dllcanonicalbad array new lengthnegative widthvector too longstring too longcannot switch from automatic to manual argument indexingcannot switch from manual to automatic argument indexingmissing '}' in format stringunmatched '}' in format stringinvalid format stringnumber is too biginf0123456789abcdefSymInitializehttps://github.com/spelunky-fyi/overlunky/releases/download/whip/Overlunky.exe../Spel2.exetrueupdateOverlunky UpdatefalseFormatting exception: --inject use the old injection method instead of Detours with --launch_gameSymFromNameconsoleFormatting exception:AutoUpdate: Can't write new filecannot write to fileargument not foundOverlunky.dll.oldOverlunky.exe.oldFormatting exception: --update_launcher update launcher to the latest WHIP buildFormatting exception: --update reset AutoUpdate setting and update launcher and DLL to the latest WHIP buildFormatting exception:DLL injecteddisabledFormatting exception: --console keep console open to debug scripts etcgenericwbFormatting exception:AutoUpdate: Can't connect to githubFormatting exception:AutoUpdate: Can't get version information from githubFormatting exception:AutoUpdate: Can't get release information from githubFormatting exception:AutoUpdate: Can't read file from githubWINDIRNANFormatting exception:Game launched with DLLFormatting
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe"
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D23300 _getche,LoadLibraryA,GetProcAddress,__acrt_iob_func,fflush,__acrt_iob_func,__acrt_iob_func,fflush,__acrt_iob_func,fflush,memcpy,memcpy,puts,puts,puts,puts,0_2_00007FF6A5D23300
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: section name: .00cfg
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: section name: .detourc
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeStatic PE information: section name: .detourd
    Source: Overlunky.dll.0.drStatic PE information: section name: .00cfg
    Source: Overlunky.dll.0.drStatic PE information: section name: .detourc
    Source: Overlunky.dll.0.drStatic PE information: section name: .detourd
    Source: Overlunky.exe.0.drStatic PE information: section name: .00cfg
    Source: Overlunky.exe.0.drStatic PE information: section name: .detourc
    Source: Overlunky.exe.0.drStatic PE information: section name: .detourd
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeFile created: C:\Users\user\Desktop\Overlunky.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeFile created: C:\Users\user\Desktop\Overlunky.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeWindow / User API: threadDelayed 428Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeWindow / User API: threadDelayed 3765Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeWindow / User API: threadDelayed 2442Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeWindow / User API: threadDelayed 1508Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeWindow / User API: threadDelayed 783Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeDropped PE file which has not been started: C:\Users\user\Desktop\Overlunky.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeAPI coverage: 9.2 %
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe TID: 5324Thread sleep time: -85600s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D421E0 ?fail@ios_base@std@@QEBA_NXZ,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF6A5D421E0
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67BDF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW7
    Source: SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67BDF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000002.3624710287.0000016B67B9F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67B9D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exe, 00000000.00000003.3463965408.0000016B67BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D42F60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A5D42F60
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D23300 _getche,LoadLibraryA,GetProcAddress,__acrt_iob_func,fflush,__acrt_iob_func,__acrt_iob_func,fflush,__acrt_iob_func,fflush,memcpy,memcpy,puts,puts,puts,puts,0_2_00007FF6A5D23300
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D42F60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A5D42F60
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D42F50 SetUnhandledExceptionFilter,0_2_00007FF6A5D42F50
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D43308 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6A5D43308
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF6A5D42ACC
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.ABApplication.VEVX-3560.5245.14683.exeCode function: 0_2_00007FF6A5D435B0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A5D435B0
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    LSASS Memory111
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Process Injection
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS2
    Process Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.