Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WSNBOfCAfh.exe

Overview

General Information

Sample name:WSNBOfCAfh.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:E58E25C8AEF38A1BC6546AEE7A5C94CB534F64D7F4FCFC937A2F5A3AD9191A5F
Analysis ID:1426781
MD5:bcb8cbe530f4f7be6a3901067961ad14
SHA1:76c49f0c0e66746201e0598b61d46dd39747cd55
SHA256:e58e25c8aef38a1bc6546aee7a5c94cb534f64d7f4fcfc937a2f5a3ad9191a5f
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • WSNBOfCAfh.exe (PID: 7296 cmdline: "C:\Users\user\Desktop\WSNBOfCAfh.exe" MD5: BCB8CBE530F4F7BE6A3901067961AD14)
    • WSNBOfCAfh.tmp (PID: 7348 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe" MD5: 593E2893150FF847791168B00FB97039)
      • GU.exe (PID: 7784 cmdline: "C:\Program Files (x86)\GU_2024\GU.exe" MD5: 5E775346C19A96D094D3D23726E969F6)
        • splwow64.exe (PID: 7860 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp, NewProcessName: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp, OriginalFileName: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp, ParentCommandLine: "C:\Users\user\Desktop\WSNBOfCAfh.exe", ParentImage: C:\Users\user\Desktop\WSNBOfCAfh.exe, ParentProcessId: 7296, ParentProcessName: WSNBOfCAfh.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe" , ProcessId: 7348, ProcessName: WSNBOfCAfh.tmp
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: WSNBOfCAfh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: WSNBOfCAfh.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: GU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: http://localhost6CloudDriveSettings.DropBoxSettings.OAuth2.RedirectPort
Source: GU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: http://localhost7CloudDriveSettings.OneDriveSettings.OAuth2.RedirectPort
Source: GU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: http://localhost:CloudDriveSettings.GoogleDriveSettings.OAuth2.RedirectPort
Source: GU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: http://localhostJEmailSettings.ConnectionSettings.WebMail.GmailSettings.OAuth2.RedirectPort
Source: GU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpString found in binary or memory: http://localhostOEmailSettings.ConnectionSettings.WebMail.Outlook365Settings.OAuth2.RedirectPort
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://maps.googleapis.com/maps/api/staticmap?S
Source: GU.exe, 00000006.00000000.1554566034.0000000001651000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.adobe.ch
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.aiim.org/pdfa/ns/extension/
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.aiim.org/pdfa/ns/id/
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.aiim.org/pdfa/ns/property#
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.aiim.org/pdfa/ns/schema#
Source: WSNBOfCAfh.tmp, 00000002.00000003.1568353523.0000000005700000.00000004.00001000.00020000.00000000.sdmp, is-4FJH0.tmp.2.drString found in binary or memory: http://www.color.org)/S/GTS_PDFX/Type/OutputIntent
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: http://www.google.com/maps/SV
Source: WSNBOfCAfh.tmp, 00000002.00000003.1568353523.0000000005700000.00000004.00001000.00020000.00000000.sdmp, is-4FJH0.tmp.2.drString found in binary or memory: http://www.npes.org/pdfx/ns/id/
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: https://code.google.com/apis/console
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: https://indy.fulgan.com/SSL/OpenSSL_add_all_ciphersOpenSSL_add_all_digestsERR_get_errorERR_peek_erro
Source: WSNBOfCAfh.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: https://www.digital-metaphors.com
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: https://www.digital-metaphors.com/orderU
Source: GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drString found in binary or memory: https://www.digital-metaphors.com/supportU
Source: WSNBOfCAfh.exe, 00000000.00000003.1327005717.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.exe, 00000000.00000003.1326671668.0000000002520000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.tmp, 00000002.00000000.1328184245.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.innosetup.com/
Source: WSNBOfCAfh.exe, 00000000.00000003.1327005717.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.exe, 00000000.00000003.1326671668.0000000002520000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.tmp, 00000002.00000000.1328184245.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.remobjects.com/ps
Source: WSNBOfCAfh.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-6RMLS.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-OH7O9.tmp.2.drStatic PE information: Number of sections : 11 > 10
Source: WSNBOfCAfh.exe, 00000000.00000003.1326671668.000000000260A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs WSNBOfCAfh.exe
Source: WSNBOfCAfh.exe, 00000000.00000003.1327005717.000000007FE36000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs WSNBOfCAfh.exe
Source: WSNBOfCAfh.exe, 00000000.00000000.1325169840.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs WSNBOfCAfh.exe
Source: WSNBOfCAfh.exe, 00000000.00000003.1583338570.0000000002288000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs WSNBOfCAfh.exe
Source: WSNBOfCAfh.exeBinary or memory string: OriginalFileName vs WSNBOfCAfh.exe
Source: WSNBOfCAfh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean3.winEXE@7/28@0/0
Source: is-4FJH0.tmp.2.drInitial sample: http://www.color.org
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Program Files (x86)\GU_2024Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeMutant created: \Sessions\1\BaseNamedObjects\GU Kalkulationsgrundlage 2024
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmpJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: WSNBOfCAfh.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeFile read: C:\Users\user\Desktop\WSNBOfCAfh.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\WSNBOfCAfh.exe "C:\Users\user\Desktop\WSNBOfCAfh.exe"
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe"
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess created: C:\Program Files (x86)\GU_2024\GU.exe "C:\Program Files (x86)\GU_2024\GU.exe"
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp "C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess created: C:\Program Files (x86)\GU_2024\GU.exe "C:\Program Files (x86)\GU_2024\GU.exe"Jump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: usp10.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: fontsub.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: winsta.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: riched20.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: msls31.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: GU 2024.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\GU_2024\GU.exe
Source: Uninstall GU 2024.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\GU_2024\unins000.exe
Source: C:\Program Files (x86)\GU_2024\GU.exeFile written: C:\Users\user\settings\GU2024.iniJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpWindow found: window name: TSelectLanguageFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpAutomated click: OK
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpAutomated click: Install
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: WSNBOfCAfh.exeStatic file information: File size 10395772 > 1048576
Source: WSNBOfCAfh.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: WSNBOfCAfh.exeStatic PE information: section name: .didata
Source: WSNBOfCAfh.tmp.0.drStatic PE information: section name: .didata
Source: is-6RMLS.tmp.2.drStatic PE information: section name: .didata
Source: is-OH7O9.tmp.2.drStatic PE information: section name: .didata
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61DEE push ecx; mov dword ptr [esp], edx6_2_00C61DF1
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61D90 push ecx; mov dword ptr [esp], edx6_2_00C61D91
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61D9C push ecx; mov dword ptr [esp], edx6_2_00C61D9D
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61DA8 push ecx; mov dword ptr [esp], edx6_2_00C61DA9
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61F40 push ecx; mov dword ptr [esp], edx6_2_00C61F41
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61B68 push ecx; mov dword ptr [esp], edx6_2_00C61B69
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61E14 push ecx; mov dword ptr [esp], edx6_2_00C61E15
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61F28 push ecx; mov dword ptr [esp], edx6_2_00C61F29
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61E36 push ecx; mov dword ptr [esp], edx6_2_00C61E39
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Program Files (x86)\GU_2024\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeFile created: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Program Files (x86)\GU_2024\is-6RMLS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Program Files (x86)\GU_2024\is-OH7O9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Program Files (x86)\GU_2024\GU.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GU_2024Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GU_2024\GU 2024.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GU_2024\Uninstall GU 2024.lnkJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WSNBOfCAfh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpDropped PE file which has not been started: C:\Program Files (x86)\GU_2024\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpDropped PE file which has not been started: C:\Program Files (x86)\GU_2024\is-6RMLS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Program Files (x86)\GU_2024\GU.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\00000809Jump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\00000809Jump to behavior
Source: C:\Program Files (x86)\GU_2024\GU.exeCode function: 6_2_00C61A1C GetSystemInfo,6_2_00C61A1C
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: WSNBOfCAfh.tmp, 00000002.00000003.1579485934.00000000009A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
Source: WSNBOfCAfh.tmp, 00000002.00000003.1568353523.000000000582F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: e`c_OhgfSPRLHBLOSOOQUX]aXPS
Source: GU.exe, 00000006.00000002.2565034643.0000000000A82000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}HdK
Source: WSNBOfCAfh.tmp, 00000002.00000003.1568353523.000000000582F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MNLLRQKQSY8RUTUXABNMWDB@?=<<??==258<50..35693/NZYYNHIICA><91.+0)-''!%**,/('&%)*FDNa?@BGIFHBLJKQTYMMOPPPRRTVW^^`_I?C>;9KKKKKKDFED>@D@=DGJJNRJMFKM><7<30>A44.734==BFGI>KOPJIJLLC@ABHHIHJLRP___`cccb`degVhhgfSlehjQSVUjnYN\^^`a_]`dbcbgdgfd
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmpQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Spearphishing Link
2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1426781 Sample: WSNBOfCAfh Startdate: 16/04/2024 Architecture: WINDOWS Score: 3 7 WSNBOfCAfh.exe 2 2->7         started        file3 17 C:\Users\user\AppData\...\WSNBOfCAfh.tmp, PE32 7->17 dropped 10 WSNBOfCAfh.tmp 20 29 7->10         started        process4 file5 19 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 10->19 dropped 21 C:\...\unins000.exe (copy), PE32 10->21 dropped 23 C:\Program Files (x86)behaviorgraphU_2024\is-OH7O9.tmp, PE32 10->23 dropped 25 2 other files (none is malicious) 10->25 dropped 13 GU.exe 3 10->13         started        process6 process7 15 splwow64.exe 1 13->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp2%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.remobjects.com/ps0%URL Reputationsafe
http://www.adobe.ch0%VirustotalBrowse
https://www.digital-metaphors.com/orderU0%VirustotalBrowse
https://indy.fulgan.com/SSL/OpenSSL_add_all_ciphersOpenSSL_add_all_digestsERR_get_errorERR_peek_erro0%VirustotalBrowse
https://www.innosetup.com/1%VirustotalBrowse
https://www.digital-metaphors.com0%VirustotalBrowse
http://www.npes.org/pdfx/ns/id/0%VirustotalBrowse
https://www.digital-metaphors.com/supportU0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.aiim.org/pdfa/ns/property#GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
    high
    https://code.google.com/apis/consoleGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
      high
      https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUWSNBOfCAfh.exefalse
        high
        https://www.digital-metaphors.com/orderUGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalseunknown
        http://localhostOEmailSettings.ConnectionSettings.WebMail.Outlook365Settings.OAuth2.RedirectPortGU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpfalse
          unknown
          http://www.adobe.chGU.exe, 00000006.00000000.1554566034.0000000001651000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalseunknown
          http://localhostJEmailSettings.ConnectionSettings.WebMail.GmailSettings.OAuth2.RedirectPortGU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpfalse
            unknown
            http://localhost6CloudDriveSettings.DropBoxSettings.OAuth2.RedirectPortGU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpfalse
              unknown
              http://www.aiim.org/pdfa/ns/id/GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
                high
                https://www.remobjects.com/psWSNBOfCAfh.exe, 00000000.00000003.1327005717.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.exe, 00000000.00000003.1326671668.0000000002520000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.tmp, 00000002.00000000.1328184245.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
                • URL Reputation: safe
                unknown
                http://localhost:CloudDriveSettings.GoogleDriveSettings.OAuth2.RedirectPortGU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpfalse
                  low
                  http://www.aiim.org/pdfa/ns/schema#GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
                    high
                    https://www.digital-metaphors.comGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalseunknown
                    http://www.google.com/maps/SVGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
                      high
                      http://www.npes.org/pdfx/ns/id/WSNBOfCAfh.tmp, 00000002.00000003.1568353523.0000000005700000.00000004.00001000.00020000.00000000.sdmp, is-4FJH0.tmp.2.drfalseunknown
                      https://www.innosetup.com/WSNBOfCAfh.exe, 00000000.00000003.1327005717.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.exe, 00000000.00000003.1326671668.0000000002520000.00000004.00001000.00020000.00000000.sdmp, WSNBOfCAfh.tmp, 00000002.00000000.1328184245.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalseunknown
                      http://www.aiim.org/pdfa/ns/extension/GU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalse
                        high
                        https://indy.fulgan.com/SSL/OpenSSL_add_all_ciphersOpenSSL_add_all_digestsERR_get_errorERR_peek_erroGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalseunknown
                        http://localhost7CloudDriveSettings.OneDriveSettings.OAuth2.RedirectPortGU.exe, 00000006.00000000.1561340685.0000000001CCD000.00000002.00000001.01000000.00000008.sdmpfalse
                          unknown
                          http://www.color.org)/S/GTS_PDFX/Type/OutputIntentWSNBOfCAfh.tmp, 00000002.00000003.1568353523.0000000005700000.00000004.00001000.00020000.00000000.sdmp, is-4FJH0.tmp.2.drfalse
                            low
                            https://www.digital-metaphors.com/supportUGU.exe, 00000006.00000000.1554566034.0000000000C51000.00000020.00000001.01000000.00000008.sdmp, is-OH7O9.tmp.2.drfalseunknown
                            No contacted IP infos
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1426781
                            Start date and time:2024-04-16 16:02:15 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 30s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:12
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:WSNBOfCAfh.exe
                            (renamed file extension from none to exe, renamed because original name is a hash value)
                            Original Sample Name:E58E25C8AEF38A1BC6546AEE7A5C94CB534F64D7F4FCFC937A2F5A3AD9191A5F
                            Detection:CLEAN
                            Classification:clean3.winEXE@7/28@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 1
                            • Number of non-executed functions: 0
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            16:03:44API Interceptor44x Sleep call for process: splwow64.exe modified
                            No context
                            No context
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmpEmcon.Zvit.2.0.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.FileRepPup.2542.22578.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.FileRepPup.2542.22578.exeGet hashmaliciousUnknownBrowse
                                  Emcon.Zvit.2.0.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Program.Unwanted.5412.26753.681.exeGet hashmaliciousPureLog StealerBrowse
                                      SecuriteInfo.com.Program.Unwanted.5412.26753.681.exeGet hashmaliciousHawkEye, PureLog StealerBrowse
                                        my0qkzrWqy.rtfGet hashmaliciousUnknownBrowse
                                          sUe62S79Mb.rtfGet hashmaliciousUnknownBrowse
                                            MDE_File_Sample_fbc11f506d4b8a1c3077fd43f6560883e512cf72.zipGet hashmaliciousUnknownBrowse
                                              https://www2.technoteam.de/rigo801/software/freetools/Converter801/Setup-Converter801_v.1.8.0.exeGet hashmaliciousUnknownBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.4, 2 pages
                                                Category:dropped
                                                Size (bytes):130412
                                                Entropy (8bit):7.720954227926037
                                                Encrypted:false
                                                SSDEEP:3072:wkVjOwP6HOCbC4ffpVC5zk4HjbXABDLoKdnNJj/TD:wOOwCHOCb/DWA4/Axh/j/v
                                                MD5:CE7835CF916B0DCF0F629383A7DC6FE2
                                                SHA1:482EEEDCAA352F5CF49AAE9ED12D9E32F6A572E7
                                                SHA-256:CA8C4E23FA1021FDEB085CD00ED3906926B5B96A0F557F85838DFB4384E5F8B6
                                                SHA-512:D7EA6B7DD4D5E4CC8B132F35A9E63B5AA6597693A12D86E498115FEF8D3211DAEB7E1D0132D25405FE3C8427158F01B3AACD7959A45127FFF3AE9E6699124929
                                                Malicious:false
                                                Reputation:low
                                                Preview:%PDF-1.4.%......315 0 obj.<</Linearized 1/L 78985/O 317/E 43126/N 2/T 72569/H [ 856 257]>>.endobj. .xref..315 28..0000000016 00000 n..0000001305 00000 n..0000001480 00000 n..0000003338 00000 n..0000004119 00000 n..0000004851 00000 n..0000005421 00000 n..0000005533 00000 n..0000005647 00000 n..0000005731 00000 n..0000006208 00000 n..0000006843 00000 n..0000007514 00000 n..0000010396 00000 n..0000013202 00000 n..0000015961 00000 n..0000018746 00000 n..0000021561 00000 n..0000024319 00000 n..0000024767 00000 n..0000025275 00000 n..0000025991 00000 n..0000028678 00000 n..0000031139 00000 n..0000034372 00000 n..0000038298 00000 n..0000001113 00000 n..0000000856 00000 n..trailer.<</Size 343/Root 316 0 R/Info 11 0 R/ID[<564730802AAA4A528CA5DCBA85FB099B><0C9EB608B4B74284B531F7E25E4EEEA2>]/Prev 72557/XRefStm 1113>>.startxref.0.%%EOF. .342 0 obj.<</C 163/Filter/FlateDecode/I 185/L 147/Length 164/S 81>>stream..h.b```b``9.....x.......X..,......``...`.lki......u4..9:@....30.0.
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.6, 2 pages
                                                Category:dropped
                                                Size (bytes):540590
                                                Entropy (8bit):7.996474385181467
                                                Encrypted:true
                                                SSDEEP:12288:61A0N/OlDQVyjwk1QsKZOoptSnkBUuCVaQJ7y1npzTTG0:65NGlcV2QsUYkiuC/72npzPG0
                                                MD5:B986DAC9A06FA07A44A1FA7A18260ACA
                                                SHA1:67F3C7E14F4358A613BA7AC342B4D4E7449EA175
                                                SHA-256:CA72FA47FD9781C03C6CFCC20BC92603B38605B455956B2194F38E0BD0A5AF22
                                                SHA-512:0F99A690E1C8D154EEFF0F4AAD37E0E5D3560BD5C3279C85F0EDAF2B2126D738CB32E9CADC7D662CE87499AA9F53F96FCBBD2506A9667AF5C6F365E81DC062A1
                                                Malicious:false
                                                Reputation:low
                                                Preview:%PDF-1.6.%......1 0 obj.<</Lang(de-DE)/Metadata 2 0 R/OutputIntents[<</DestOutputProfile 6 0 R/Info(Coated FOGRA39 \(ISO 12647-2:2004\))/OutputConditionIdentifier(FOGRA27)/RegistryName(http://www.color.org)/S/GTS_PDFX/Type/OutputIntent>>]/PageLabels 7 0 R/Pages 3 0 R/Type/Catalog/ViewerPreferences<</Direction/L2R>>>>.endobj.2 0 obj.<</Length 2925/Subtype/XML/Type/Metadata>>stream..<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 7.1-c000 79.a8731b9, 2021/09/09-00:37:38 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:pdf="http://n
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.5 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):200579
                                                Entropy (8bit):6.506268470787151
                                                Encrypted:false
                                                SSDEEP:3072:VY/TukgOPvop2wozXcsiwSZ1IWJeyP/3GPubNbRDD4:VYrZhw8e1I18v8mDD4
                                                MD5:704B2DE1C6C7BA5D16B2B548135CEA83
                                                SHA1:9B9D27C4E2024F66330E9B5BF68271CFD358FA44
                                                SHA-256:9A7C52A5F843764F1DA02983B7F11D3839EF3C46991D6524C70F356A93223071
                                                SHA-512:E43D5729A89722E5C44E050C1F7AAA2112B13B8F6704D386CF6D27AD373F43DD646DE88CFE2BD0A94AC9EF1DF99EE35B0F120342B40DBA0936A87F5FF4620D28
                                                Malicious:false
                                                Reputation:low
                                                Preview:%PDF-1.5.%.....8 0 obj.<</Length 4>>stream.. q .endstream.endobj.9 0 obj.<</Filter/FlateDecode/Length 2767>>stream.H..W.n.F.}.W....Z....I.=.L..'.[...D;JdZ.$.....U.*.t.. ..k...."._~Z.wb.m../....?|.R\\|..}..I..L+.gr..l..k)..J...V.3...).a.43F..J.....~6...nw..C{.w7&W-..q.o.b...=5.....jv..n....L.T..b.'.,.#.;TU....?..TQ..4.]..3[...>..~...9....G.?..J8g....J..*.4...4U....eV.yV..?.$...B......7.N.....6i-.'.R...[.....%......m..u..n....Z\..l..|....o.&?....9..."....0.........k.,.J......a..].mN..~.<.._]^]I)..A..i%...\i<.....o..P..D......>....|.p..^j.A#.....#.>x)9..I.].I.i&.....`.v...KN.Bg...U SU..p..).......8.Pfk6..@......(...#..}..+...<.?.&.....h...6.`...~.Ogw?Vgg......bOH..n..&......T..{...~.........?c*....]S~.}(........B.......\.%t.&hh.e5).YX(.,...*-}...VEq..<.]...ap..V|qx.#@.........u.r.......%#.^.i.....`..c.(.r..GX...9..k:.jZJv.../..V.V...8..s...g..4.Q...F.\.U....]..$C.2..E..8. .N..*..N1.......l....kZ.p8\*;....\...`jK..Z......LzpiD.U.......K7..8
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.5 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):186130
                                                Entropy (8bit):6.346261247780766
                                                Encrypted:false
                                                SSDEEP:3072:FjdyHeyOhXuzwxoBuk2QyP/3GPubNbRDeEAG:Xa2ezwxoBukl8v8mDeEAG
                                                MD5:904AB3BC440D3AECF0BB324CE15D1B5E
                                                SHA1:68261643FF9851A4BA0F8ECE155C23C9CD626848
                                                SHA-256:9ACC623CE241AF98FBBD5FB0A6C85DC01084556496DCD76CAF04A3A036B528BF
                                                SHA-512:C505164D1E154F7DA9FA6214B51ACB35DE17861E53838A61C558E51F1250F82383819C5EE7FFDC44968C76E7236C00975D8DB71D09284F854E1FD5EB0111AE7C
                                                Malicious:false
                                                Reputation:low
                                                Preview:%PDF-1.5.%.....8 0 obj.<</Length 4>>stream.. q .endstream.endobj.9 0 obj.<</Filter/FlateDecode/Length 2335>>stream.H..W]o...}....VKr...a.I....z./.E.}u+Kn,...}g..~.d+7.A...K..9s..lT.)......G......y4...piv?.(...h..Z...y...=...w...e....j..:..r-.....|..e....;..<.E.._b......g.8[6.X<.p.q$.*o.........-...Li..y..f..O....D......UU.....Y.y.K6.2...+<...U6is)...D...=.Tp.x.M.\y..`.x.).`...w..j|.w....[..o..=...N.'....~rnI..D...........F.!U..-Gc)0......r..b..of....7.77EQ.WWW...b4....Q.F*<q...M...n................w...|S.@WJx#.K]...h).T9.z..Z..lq..U.%.B.`.#.e..Z...p..(d..lR...NR%^....I..wM..x...K0.........e.xb..9.b...)A....".+..W.`..kB.r$^.0.n....lR6h.=....*....'.`.@........J.)`.V..U.;.......a.7KC....H...........r..]..$f6.9...rI8.`j.T.....nS.8.N.%.!.....x#~.\4]S5..q...&....U..I.].\.......E_....D.:.8.[>......:W!....M.......J...a...?BFPE.[...n.).>...W.0.A..i.."...g.?.W.'oxd...9.....q...l..b...-..?N".. ...ReT......C.LN.9f...'.4....9..g......Y.........y..
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):19850752
                                                Entropy (8bit):6.446730011865548
                                                Encrypted:false
                                                SSDEEP:393216:YXdC7qRxSZSRncIHaPdMhtQz7731jnUvqQgNL:yChrljnUhg
                                                MD5:5E775346C19A96D094D3D23726E969F6
                                                SHA1:8C67F9716E9176F2705997D70AB1B2BE1282D3B5
                                                SHA-256:400ACCA53536DE9A5EBBC18F02F0BF21CC6692B5825D2E998DCF043B47AAE20B
                                                SHA-512:EAD7BAEC0924B7E188C0A5A03A04B198721DBE2C7169ABBDE3640A9E1D308E5C100421ED815D387C6E26F26E0352B26B0EA48F8CCA1C0FED30CF8320C0D66835
                                                Malicious:false
                                                Reputation:low
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......e......................Z.....4*.......0....@..........................@3...........@......@...................0..k.......nU...p....D..................`...............................P..........................L.... ..h....................text....y.......z.................. ..`.itext...............~.............. ..`.data...d....0......................@....bss.....................................idata..nU.......V..................@....didata.h.... ......................@....edata..k....0......................@..@.tls....`....@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc.....D..p....D..$..............@..@.............@3.....................@..@................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [TarifGUUser]
                                                Category:dropped
                                                Size (bytes):1053
                                                Entropy (8bit):5.168890085285299
                                                Encrypted:false
                                                SSDEEP:24:ubjEY+Re0Cy6BvnBBWyATJ4YgUbMs4jgO/:uc80CtvBByiY45
                                                MD5:F6B9BC3938DF32C64E9DF5BD0557234F
                                                SHA1:3351FFAEE9E238E2D1DF5D53FB5A37F8B91B391E
                                                SHA-256:BE6004A6DAB48079160EB93A5B7FB9E7FDA6C5D3A14144C80E6A189DA4976C0C
                                                SHA-512:3314A03B1EE0C71786CDFDAF7A2CE340DAB774B1621DCF4BE591A299F8F222128F48986152DBA64E0CC0E66B0708919543020EE073141659E137E379FA08C122
                                                Malicious:false
                                                Reputation:low
                                                Preview:[TarifGuStanard]..Caption=GU Kalkulationsgrundlage 2024..Version=V5..GuAnsVolumen=250..GuAnsFlaeche=500..GuAnsLademeter=1200..GuAnsPalette=500..GuAnsLaenger3MProz=25..GuAnsLaenger3MMax=50 ..GuAnsStockwLief=10..GuAnsStockwLiefMin=50..GuAnsLieferterminBis0900=80..GuAnsLieferterminAb0900=60..GuAnsFixTerminLieferung=80..GuAnsFixterminAbholung=80..GuAnsAbholungNach1630=80..GuAnsAdrProz=10..GuAnsAdrMin=20..GuAnsAdrMax=50..GuAnsExProz=20..GuAnsExMin=50..GuAnsExMax=130..GuAnsNNProz=2..GuAnsNNmin=30..GuAnsTreibstZuschlProz=0..GuAnsReUnterFr100=20..GuAnsAvis=5..GuAnsMwStSatz=8.1..GuAnsZusLadeSt=60..GuAnsPneuProz=55..GuAnsKuehlgutProz=20..GuAnsPalZuschlProz=0..GUmaxBerechnungKg=24000..GuMindAnsBisKm50=70..GuMindAnsBisKm100=76..GuMindAnsBisKm150=81..GuMindAnsBisKm200=87.5..GuMindAnsUeberKm200=97.5..GuAnsatzLuftfracht=20..GuAnsTerminvereinbarung=5....[TarifGUUser]..UserSprache=0..UserMwSt=8.1..UserTreibStZuschl=4..UserRabattProz=0..UserZuschlagProz=0..UserAbsFest=0..UserAbsPLZ=..UserAbsOrt=..UserPa
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):26030
                                                Entropy (8bit):5.4897570254264805
                                                Encrypted:false
                                                SSDEEP:768:pW1iLxKk1zBV+82zmRG8gP80l277/ddmoo1oomoohIIVpf:4IV3IzSlg1s77/ddhf
                                                MD5:29CAAD60C827D0AF69E02B918944C3AE
                                                SHA1:CFA01E1443CDF79121474351A782D872A741727C
                                                SHA-256:79FA29A261CBD815357678D08FB42F9EAC626AB44C7C4EF4D482BC04768DFE69
                                                SHA-512:CF56E9E57A9FACBE92894D7AD392F2C888DCF205CD19915302559BA67076A41CCB3504E2A083CC8C89BB726C9C781ACE5E4341BF23AD92C802249176CBC744B7
                                                Malicious:false
                                                Reputation:low
                                                Preview:MLD...........*...4..............e........&....................Native..Native...(...fr..FR...........French..fran.ais...)...it..IT...........Italian..italiano.....Achtung!..Attention..Attenzione..OK (Ctrl)..OK (Ctrl)..OK (Ctrl)..String-Listen-Editor..String-liste-.diteur..editor - liste - string..OK..OK..OK..Abbrechen..Interrompre..Interrompere..memo..memo..memo..Einstellungen..Programmation..Regolationi..OK..OK..OK..Abbrechen..Interrompre..Interrompere..Sprache..Langue..Lingua..Deutsch..Allemand..Tedesco..Franz.sisch..Fran.ais..Francese..Italienisch..Italien..Italiano..AbsPlz..NPAExp..CAP/Mitt..Zuschlag %..Suppl.ment %..Supplemento %..Zuschlag..Suppl.ment..Supplemento..Treibstoffzuschlag in %..Suppl.ment carburant en %..Supplemento carburante %..Treibstoffzuschlag..Suppl. carburant..Supplemento carburante..Rabatt %..Rabais %..Ribasso %..Rabatt..Rabais..Ribasso..MwSt in %..TVA en %..IVA %..MwSt..TVA..IVA..Palettenzuschlag in %..suppl.ment palettes en %..Supplemento palette in %..Palett
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22306200
                                                Entropy (8bit):5.27183443590215
                                                Encrypted:false
                                                SSDEEP:196608:v/X0jtNMzdavNU+UO8fDWiRaV+eV3g9UWdgK1:XX0jtNMzdavqFO8lNyW
                                                MD5:E7A5BDC8731E9B230DE492D2D02F65CD
                                                SHA1:847C43A6374D53E9D89EE0D61737DDADFD00FF79
                                                SHA-256:FFE5E10D3DD08FC6F6504409056CE3F4BF0F5AD5913379A5991503AAA2671A44
                                                SHA-512:0B65947587CA6E72B79B5FED63B480130F371EC7B67D664E9FF43C805A43969D9A1C8E1B4748A8EBDC6FBE2A30D531C3FD3E6D3B7A8726000A96AF46FC11CB2F
                                                Malicious:false
                                                Reputation:low
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [Zone1]
                                                Category:dropped
                                                Size (bytes):268
                                                Entropy (8bit):4.195691050065407
                                                Encrypted:false
                                                SSDEEP:6:U4T4h04/7mIC79eIyg471YVoICd+hAhQ9omgP8FFY:Uxn/7Me371rYhAUgP8FFY
                                                MD5:C44732B340B1BBA019C8CC78E932880F
                                                SHA1:F45DE24D87DA1EC38629056A0766444F9B7DE363
                                                SHA-256:BBB0E2995035C3EED04C3CDF7C935AAC18844505A7508C95A2F3C66772C2DC87
                                                SHA-512:4181D251658AF4084A8D13824C38CE8A554C99EBB595B77EF74050ED4332C7B970FFCA980EC87ABC0578D2844502DF9EF0B9121EC114FD969C68B0886F8A4DA7
                                                Malicious:false
                                                Reputation:low
                                                Preview:[Zone0]..toZ0=0.00..toZ1=5.00..toZ2=5.50..toZ3=6.00....[Zone1]..toZ0=5.00..toZ1=5.50..toZ2=6.00..toZ3=6.50....[Zone2]..toZ0=5.50..toZ1=6.00..toZ2=6.50..toZ3=7.00....[Zone3]..toZ0=6.00..toZ1=6.50..toZ2=7.00..toZ3=7.50....[Update]..timestamp=2022-10-26T03:25:38.458Z....
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [Stufe01Zone01]
                                                Category:dropped
                                                Size (bytes):9577
                                                Entropy (8bit):3.6940300483268698
                                                Encrypted:false
                                                SSDEEP:192:s8/Gd2b7t2bUj+PupcL8NDvQjdKRQ/wdLCxqfLhqH4Hy999U9+9Se:s8/Gd2b7t2bUj+PupcL8NDvQjdKRQ/w+
                                                MD5:20AD44DD652373FBD5F64FD80C47C8A9
                                                SHA1:9C96BF242D7AA679D0A21689AF6FD90E50536BE5
                                                SHA-256:4BA1F0C64CECF93C4DDDC45066222B59CAF83B727DE7D51466B69D58011A0697
                                                SHA-512:12651F5114DD4056049CBFF2AAA11FDB5A4D232AB3A6373819EE6CB1B11CE3EDE0094C37269DB4D93BCE6BEA9B19C7F9EA651FFAC1734E8E51365EF2B22D388B
                                                Malicious:false
                                                Reputation:low
                                                Preview:[Stufe01Zone00]..toZ00=0..toZ01=2..toZ02=2.5..toZ03=3..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone01]..toZ00=2..toZ01=2.5..toZ02=3..toZ03=3.5..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone02]..toZ00=2.5..toZ01=3..toZ02=3.5..toZ03=4..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone03]..toZ00=3..toZ01=3.5..toZ02=4..toZ03=4.5..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone04]..toZ00=0..toZ01=0..toZ02=0..toZ03=0..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..t
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.6, 2 pages
                                                Category:dropped
                                                Size (bytes):540590
                                                Entropy (8bit):7.996474385181467
                                                Encrypted:true
                                                SSDEEP:12288:61A0N/OlDQVyjwk1QsKZOoptSnkBUuCVaQJ7y1npzTTG0:65NGlcV2QsUYkiuC/72npzPG0
                                                MD5:B986DAC9A06FA07A44A1FA7A18260ACA
                                                SHA1:67F3C7E14F4358A613BA7AC342B4D4E7449EA175
                                                SHA-256:CA72FA47FD9781C03C6CFCC20BC92603B38605B455956B2194F38E0BD0A5AF22
                                                SHA-512:0F99A690E1C8D154EEFF0F4AAD37E0E5D3560BD5C3279C85F0EDAF2B2126D738CB32E9CADC7D662CE87499AA9F53F96FCBBD2506A9667AF5C6F365E81DC062A1
                                                Malicious:false
                                                Reputation:low
                                                Preview:%PDF-1.6.%......1 0 obj.<</Lang(de-DE)/Metadata 2 0 R/OutputIntents[<</DestOutputProfile 6 0 R/Info(Coated FOGRA39 \(ISO 12647-2:2004\))/OutputConditionIdentifier(FOGRA27)/RegistryName(http://www.color.org)/S/GTS_PDFX/Type/OutputIntent>>]/PageLabels 7 0 R/Pages 3 0 R/Type/Catalog/ViewerPreferences<</Direction/L2R>>>>.endobj.2 0 obj.<</Length 2925/Subtype/XML/Type/Metadata>>stream..<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 7.1-c000 79.a8731b9, 2021/09/09-00:37:38 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:pdf="http://n
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3137597
                                                Entropy (8bit):6.357128447667352
                                                Encrypted:false
                                                SSDEEP:49152:tWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTb8333Hn:3tLutqgwh4NYxtJpkxhGL333H
                                                MD5:6ACB94727498585280E9C07460D586BC
                                                SHA1:8D46A2CDA0E9D328EE320E13671FB57F62CBAE31
                                                SHA-256:32FD0FEBACD030BC9D15FF6544033322FACD2B2091E3837F5CCC4E3478E5112D
                                                SHA-512:247E69656892A5E53CD5741F287A51D71BC8607F501B881B690643EDA0A178677B1ECDF98EC0AA48250A603C400FB702C44F48CC0D50D9095A0D4E19F4DF652B
                                                Malicious:false
                                                Reputation:low
                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,..2......hf,......p,...@..........................p0...........@......@....................-.......-..9.......R...........................................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc....R.......T....-.............@..@..............1.......0.............@..@........................................................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [Zone1]
                                                Category:dropped
                                                Size (bytes):268
                                                Entropy (8bit):4.195691050065407
                                                Encrypted:false
                                                SSDEEP:6:U4T4h04/7mIC79eIyg471YVoICd+hAhQ9omgP8FFY:Uxn/7Me371rYhAUgP8FFY
                                                MD5:C44732B340B1BBA019C8CC78E932880F
                                                SHA1:F45DE24D87DA1EC38629056A0766444F9B7DE363
                                                SHA-256:BBB0E2995035C3EED04C3CDF7C935AAC18844505A7508C95A2F3C66772C2DC87
                                                SHA-512:4181D251658AF4084A8D13824C38CE8A554C99EBB595B77EF74050ED4332C7B970FFCA980EC87ABC0578D2844502DF9EF0B9121EC114FD969C68B0886F8A4DA7
                                                Malicious:false
                                                Reputation:low
                                                Preview:[Zone0]..toZ0=0.00..toZ1=5.00..toZ2=5.50..toZ3=6.00....[Zone1]..toZ0=5.00..toZ1=5.50..toZ2=6.00..toZ3=6.50....[Zone2]..toZ0=5.50..toZ1=6.00..toZ2=6.50..toZ3=7.00....[Zone3]..toZ0=6.00..toZ1=6.50..toZ2=7.00..toZ3=7.50....[Update]..timestamp=2022-10-26T03:25:38.458Z....
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.5 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):200579
                                                Entropy (8bit):6.506268470787151
                                                Encrypted:false
                                                SSDEEP:3072:VY/TukgOPvop2wozXcsiwSZ1IWJeyP/3GPubNbRDD4:VYrZhw8e1I18v8mDD4
                                                MD5:704B2DE1C6C7BA5D16B2B548135CEA83
                                                SHA1:9B9D27C4E2024F66330E9B5BF68271CFD358FA44
                                                SHA-256:9A7C52A5F843764F1DA02983B7F11D3839EF3C46991D6524C70F356A93223071
                                                SHA-512:E43D5729A89722E5C44E050C1F7AAA2112B13B8F6704D386CF6D27AD373F43DD646DE88CFE2BD0A94AC9EF1DF99EE35B0F120342B40DBA0936A87F5FF4620D28
                                                Malicious:false
                                                Preview:%PDF-1.5.%.....8 0 obj.<</Length 4>>stream.. q .endstream.endobj.9 0 obj.<</Filter/FlateDecode/Length 2767>>stream.H..W.n.F.}.W....Z....I.=.L..'.[...D;JdZ.$.....U.*.t.. ..k...."._~Z.wb.m../....?|.R\\|..}..I..L+.gr..l..k)..J...V.3...).a.43F..J.....~6...nw..C{.w7&W-..q.o.b...=5.....jv..n....L.T..b.'.,.#.;TU....?..TQ..4.]..3[...>..~...9....G.?..J8g....J..*.4...4U....eV.yV..?.$...B......7.N.....6i-.'.R...[.....%......m..u..n....Z\..l..|....o.&?....9..."....0.........k.,.J......a..].mN..~.<.._]^]I)..A..i%...\i<.....o..P..D......>....|.p..^j.A#.....#.>x)9..I.].I.i&.....`.v...KN.Bg...U SU..p..).......8.Pfk6..@......(...#..}..+...<.?.&.....h...6.`...~.Ogw?Vgg......bOH..n..&......T..{...~.........?c*....]S~.}(........B.......\.%t.&hh.e5).YX(.,...*-}...VEq..<.]...ap..V|qx.#@.........u.r.......%#.^.i.....`..c.(.r..GX...9..k:.jZJv.../..V.V...8..s...g..4.Q...F.\.U....]..$C.2..E..8. .N..*..N1.......l....kZ.p8\*;....\...`jK..Z......LzpiD.U.......K7..8
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.4, 2 pages
                                                Category:dropped
                                                Size (bytes):130412
                                                Entropy (8bit):7.720954227926037
                                                Encrypted:false
                                                SSDEEP:3072:wkVjOwP6HOCbC4ffpVC5zk4HjbXABDLoKdnNJj/TD:wOOwCHOCb/DWA4/Axh/j/v
                                                MD5:CE7835CF916B0DCF0F629383A7DC6FE2
                                                SHA1:482EEEDCAA352F5CF49AAE9ED12D9E32F6A572E7
                                                SHA-256:CA8C4E23FA1021FDEB085CD00ED3906926B5B96A0F557F85838DFB4384E5F8B6
                                                SHA-512:D7EA6B7DD4D5E4CC8B132F35A9E63B5AA6597693A12D86E498115FEF8D3211DAEB7E1D0132D25405FE3C8427158F01B3AACD7959A45127FFF3AE9E6699124929
                                                Malicious:false
                                                Preview:%PDF-1.4.%......315 0 obj.<</Linearized 1/L 78985/O 317/E 43126/N 2/T 72569/H [ 856 257]>>.endobj. .xref..315 28..0000000016 00000 n..0000001305 00000 n..0000001480 00000 n..0000003338 00000 n..0000004119 00000 n..0000004851 00000 n..0000005421 00000 n..0000005533 00000 n..0000005647 00000 n..0000005731 00000 n..0000006208 00000 n..0000006843 00000 n..0000007514 00000 n..0000010396 00000 n..0000013202 00000 n..0000015961 00000 n..0000018746 00000 n..0000021561 00000 n..0000024319 00000 n..0000024767 00000 n..0000025275 00000 n..0000025991 00000 n..0000028678 00000 n..0000031139 00000 n..0000034372 00000 n..0000038298 00000 n..0000001113 00000 n..0000000856 00000 n..trailer.<</Size 343/Root 316 0 R/Info 11 0 R/ID[<564730802AAA4A528CA5DCBA85FB099B><0C9EB608B4B74284B531F7E25E4EEEA2>]/Prev 72557/XRefStm 1113>>.startxref.0.%%EOF. .342 0 obj.<</C 163/Filter/FlateDecode/I 185/L 147/Length 164/S 81>>stream..h.b```b``9.....x.......X..,......``...`.lki......u4..9:@....30.0.
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):19850752
                                                Entropy (8bit):6.446730011865548
                                                Encrypted:false
                                                SSDEEP:393216:YXdC7qRxSZSRncIHaPdMhtQz7731jnUvqQgNL:yChrljnUhg
                                                MD5:5E775346C19A96D094D3D23726E969F6
                                                SHA1:8C67F9716E9176F2705997D70AB1B2BE1282D3B5
                                                SHA-256:400ACCA53536DE9A5EBBC18F02F0BF21CC6692B5825D2E998DCF043B47AAE20B
                                                SHA-512:EAD7BAEC0924B7E188C0A5A03A04B198721DBE2C7169ABBDE3640A9E1D308E5C100421ED815D387C6E26F26E0352B26B0EA48F8CCA1C0FED30CF8320C0D66835
                                                Malicious:false
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......e......................Z.....4*.......0....@..........................@3...........@......@...................0..k.......nU...p....D..................`...............................P..........................L.... ..h....................text....y.......z.................. ..`.itext...............~.............. ..`.data...d....0......................@....bss.....................................idata..nU.......V..................@....didata.h.... ......................@....edata..k....0......................@..@.tls....`....@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc.....D..p....D..$..............@..@.............@3.....................@..@................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PDF document, version 1.5 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):186130
                                                Entropy (8bit):6.346261247780766
                                                Encrypted:false
                                                SSDEEP:3072:FjdyHeyOhXuzwxoBuk2QyP/3GPubNbRDeEAG:Xa2ezwxoBukl8v8mDeEAG
                                                MD5:904AB3BC440D3AECF0BB324CE15D1B5E
                                                SHA1:68261643FF9851A4BA0F8ECE155C23C9CD626848
                                                SHA-256:9ACC623CE241AF98FBBD5FB0A6C85DC01084556496DCD76CAF04A3A036B528BF
                                                SHA-512:C505164D1E154F7DA9FA6214B51ACB35DE17861E53838A61C558E51F1250F82383819C5EE7FFDC44968C76E7236C00975D8DB71D09284F854E1FD5EB0111AE7C
                                                Malicious:false
                                                Preview:%PDF-1.5.%.....8 0 obj.<</Length 4>>stream.. q .endstream.endobj.9 0 obj.<</Filter/FlateDecode/Length 2335>>stream.H..W]o...}....VKr...a.I....z./.E.}u+Kn,...}g..~.d+7.A...K..9s..lT.)......G......y4...piv?.(...h..Z...y...=...w...e....j..:..r-.....|..e....;..<.E.._b......g.8[6.X<.p.q$.*o.........-...Li..y..f..O....D......UU.....Y.y.K6.2...+<...U6is)...D...=.Tp.x.M.\y..`.x.).`...w..j|.w....[..o..=...N.'....~rnI..D...........F.!U..-Gc)0......r..b..of....7.77EQ.WWW...b4....Q.F*<q...M...n................w...|S.@WJx#.K]...h).T9.z..Z..lq..U.%.B.`.#.e..Z...p..(d..lR...NR%^....I..wM..x...K0.........e.xb..9.b...)A....".+..W.`..kB.r$^.0.n....lR6h.=....*....'.`.@........J.)`.V..U.;.......a.7KC....H...........r..]..$f6.9...rI8.`j.T.....nS.8.N.%.!.....x#~.\4]S5..q...&....U..I.].\.......E_....D.:.8.[>......:W!....M.......J...a...?BFPE.[...n.).>...W.0.A..i.."...g.?.W.'oxd...9.....q...l..b...-..?N".. ...ReT......C.LN.9f...'.4....9..g......Y.........y..
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [TarifGUUser]
                                                Category:dropped
                                                Size (bytes):1053
                                                Entropy (8bit):5.168890085285299
                                                Encrypted:false
                                                SSDEEP:24:ubjEY+Re0Cy6BvnBBWyATJ4YgUbMs4jgO/:uc80CtvBByiY45
                                                MD5:F6B9BC3938DF32C64E9DF5BD0557234F
                                                SHA1:3351FFAEE9E238E2D1DF5D53FB5A37F8B91B391E
                                                SHA-256:BE6004A6DAB48079160EB93A5B7FB9E7FDA6C5D3A14144C80E6A189DA4976C0C
                                                SHA-512:3314A03B1EE0C71786CDFDAF7A2CE340DAB774B1621DCF4BE591A299F8F222128F48986152DBA64E0CC0E66B0708919543020EE073141659E137E379FA08C122
                                                Malicious:false
                                                Preview:[TarifGuStanard]..Caption=GU Kalkulationsgrundlage 2024..Version=V5..GuAnsVolumen=250..GuAnsFlaeche=500..GuAnsLademeter=1200..GuAnsPalette=500..GuAnsLaenger3MProz=25..GuAnsLaenger3MMax=50 ..GuAnsStockwLief=10..GuAnsStockwLiefMin=50..GuAnsLieferterminBis0900=80..GuAnsLieferterminAb0900=60..GuAnsFixTerminLieferung=80..GuAnsFixterminAbholung=80..GuAnsAbholungNach1630=80..GuAnsAdrProz=10..GuAnsAdrMin=20..GuAnsAdrMax=50..GuAnsExProz=20..GuAnsExMin=50..GuAnsExMax=130..GuAnsNNProz=2..GuAnsNNmin=30..GuAnsTreibstZuschlProz=0..GuAnsReUnterFr100=20..GuAnsAvis=5..GuAnsMwStSatz=8.1..GuAnsZusLadeSt=60..GuAnsPneuProz=55..GuAnsKuehlgutProz=20..GuAnsPalZuschlProz=0..GUmaxBerechnungKg=24000..GuMindAnsBisKm50=70..GuMindAnsBisKm100=76..GuMindAnsBisKm150=81..GuMindAnsBisKm200=87.5..GuMindAnsUeberKm200=97.5..GuAnsatzLuftfracht=20..GuAnsTerminvereinbarung=5....[TarifGUUser]..UserSprache=0..UserMwSt=8.1..UserTreibStZuschl=4..UserRabattProz=0..UserZuschlagProz=0..UserAbsFest=0..UserAbsPLZ=..UserAbsOrt=..UserPa
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:Generic INItialization configuration [Stufe01Zone01]
                                                Category:dropped
                                                Size (bytes):9577
                                                Entropy (8bit):3.6940300483268698
                                                Encrypted:false
                                                SSDEEP:192:s8/Gd2b7t2bUj+PupcL8NDvQjdKRQ/wdLCxqfLhqH4Hy999U9+9Se:s8/Gd2b7t2bUj+PupcL8NDvQjdKRQ/w+
                                                MD5:20AD44DD652373FBD5F64FD80C47C8A9
                                                SHA1:9C96BF242D7AA679D0A21689AF6FD90E50536BE5
                                                SHA-256:4BA1F0C64CECF93C4DDDC45066222B59CAF83B727DE7D51466B69D58011A0697
                                                SHA-512:12651F5114DD4056049CBFF2AAA11FDB5A4D232AB3A6373819EE6CB1B11CE3EDE0094C37269DB4D93BCE6BEA9B19C7F9EA651FFAC1734E8E51365EF2B22D388B
                                                Malicious:false
                                                Preview:[Stufe01Zone00]..toZ00=0..toZ01=2..toZ02=2.5..toZ03=3..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone01]..toZ00=2..toZ01=2.5..toZ02=3..toZ03=3.5..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone02]..toZ00=2.5..toZ01=3..toZ02=3.5..toZ03=4..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone03]..toZ00=3..toZ01=3.5..toZ02=4..toZ03=4.5..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..toZ16=0..toZ17=0..toZ18=0..toZ19=0..toZ20=0..[Stufe01Zone04]..toZ00=0..toZ01=0..toZ02=0..toZ03=0..toZ04=0..toZ05=0..toZ06=0..toZ07=0..toZ08=0..toZ09=0..toZ10=0..toZ11=0..toZ12=0..toZ13=0..toZ14=0..toZ15=0..t
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22306200
                                                Entropy (8bit):5.27183443590215
                                                Encrypted:false
                                                SSDEEP:196608:v/X0jtNMzdavNU+UO8fDWiRaV+eV3g9UWdgK1:XX0jtNMzdavqFO8lNyW
                                                MD5:E7A5BDC8731E9B230DE492D2D02F65CD
                                                SHA1:847C43A6374D53E9D89EE0D61737DDADFD00FF79
                                                SHA-256:FFE5E10D3DD08FC6F6504409056CE3F4BF0F5AD5913379A5991503AAA2671A44
                                                SHA-512:0B65947587CA6E72B79B5FED63B480130F371EC7B67D664E9FF43C805A43969D9A1C8E1B4748A8EBDC6FBE2A30D531C3FD3E6D3B7A8726000A96AF46FC11CB2F
                                                Malicious:false
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):26030
                                                Entropy (8bit):5.4897570254264805
                                                Encrypted:false
                                                SSDEEP:768:pW1iLxKk1zBV+82zmRG8gP80l277/ddmoo1oomoohIIVpf:4IV3IzSlg1s77/ddhf
                                                MD5:29CAAD60C827D0AF69E02B918944C3AE
                                                SHA1:CFA01E1443CDF79121474351A782D872A741727C
                                                SHA-256:79FA29A261CBD815357678D08FB42F9EAC626AB44C7C4EF4D482BC04768DFE69
                                                SHA-512:CF56E9E57A9FACBE92894D7AD392F2C888DCF205CD19915302559BA67076A41CCB3504E2A083CC8C89BB726C9C781ACE5E4341BF23AD92C802249176CBC744B7
                                                Malicious:false
                                                Preview:MLD...........*...4..............e........&....................Native..Native...(...fr..FR...........French..fran.ais...)...it..IT...........Italian..italiano.....Achtung!..Attention..Attenzione..OK (Ctrl)..OK (Ctrl)..OK (Ctrl)..String-Listen-Editor..String-liste-.diteur..editor - liste - string..OK..OK..OK..Abbrechen..Interrompre..Interrompere..memo..memo..memo..Einstellungen..Programmation..Regolationi..OK..OK..OK..Abbrechen..Interrompre..Interrompere..Sprache..Langue..Lingua..Deutsch..Allemand..Tedesco..Franz.sisch..Fran.ais..Francese..Italienisch..Italien..Italiano..AbsPlz..NPAExp..CAP/Mitt..Zuschlag %..Suppl.ment %..Supplemento %..Zuschlag..Suppl.ment..Supplemento..Treibstoffzuschlag in %..Suppl.ment carburant en %..Supplemento carburante %..Treibstoffzuschlag..Suppl. carburant..Supplemento carburante..Rabatt %..Rabais %..Ribasso %..Rabatt..Rabais..Ribasso..MwSt in %..TVA en %..IVA %..MwSt..TVA..IVA..Palettenzuschlag in %..suppl.ment palettes en %..Supplemento palette in %..Palett
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:InnoSetup Log GU Kalkulationsgrundlage 2024 {0EDBF4D3-E651-4455-AC3F-D984152B0B89}, version 0x418, 3337 bytes, 724471\37\user, C:\Program Files (x86)\GU_2024\376\377\377
                                                Category:modified
                                                Size (bytes):3337
                                                Entropy (8bit):3.5501403385302197
                                                Encrypted:false
                                                SSDEEP:96:F9AlGNC6Cj0nVbDbCTCHwCH9BbCrCahRCahSMHhTr:/Al4Cj2pnfCxtH1r
                                                MD5:A2D63E9A6AB6BAB3F612F6FE4A62721A
                                                SHA1:1B0C683170275E63CC70A2913EF99FFB74A93299
                                                SHA-256:C58D4DA0CED397BFADF5FCB413385EF02014157F507FC1F52AB7660B57748307
                                                SHA-512:3ADDACE0A01B10B8F7471A3EC6AA514D5B0ABFE4178DE4795CB655C3CA3B19E742F4B3DD85EC15A4271D13F608553BC599885ABA9F38C7FA607CE1659E46C037
                                                Malicious:false
                                                Preview:Inno Setup Uninstall Log (b)....................................{0EDBF4D3-E651-4455-AC3F-D984152B0B89}..........................................................................................GU Kalkulationsgrundlage 2024.................................................................................................................................................................................................................................)=........h.Z...............7.2.4.4.7.1......f.r.o.n.t.d.e.s.k......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4..................&.... ........................C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4......C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.t.a.r.t. .M.e.n.u.\.P.r.o.g.r.a.m.s.\.G.U._.2.0.2.4......G.U._.2.0.2.4......e.n.g.l.i.s.h.............B........C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4........d........C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3137597
                                                Entropy (8bit):6.357128447667352
                                                Encrypted:false
                                                SSDEEP:49152:tWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTb8333Hn:3tLutqgwh4NYxtJpkxhGL333H
                                                MD5:6ACB94727498585280E9C07460D586BC
                                                SHA1:8D46A2CDA0E9D328EE320E13671FB57F62CBAE31
                                                SHA-256:32FD0FEBACD030BC9D15FF6544033322FACD2B2091E3837F5CCC4E3478E5112D
                                                SHA-512:247E69656892A5E53CD5741F287A51D71BC8607F501B881B690643EDA0A178677B1ECDF98EC0AA48250A603C400FB702C44F48CC0D50D9095A0D4E19F4DF652B
                                                Malicious:false
                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,..2......hf,......p,...@..........................p0...........@......@....................-.......-..9.......R...........................................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc....R.......T....-.............@..@..............1.......0.............@..@........................................................
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 16 13:03:38 2024, mtime=Tue Apr 16 13:03:39 2024, atime=Wed Feb 14 13:57:06 2024, length=19850752, window=hide
                                                Category:dropped
                                                Size (bytes):1053
                                                Entropy (8bit):4.607199827506089
                                                Encrypted:false
                                                SSDEEP:24:8mo/2E5+dOE4qzTmmA6nYicdR/HrdR/0UULx4KJ8KJUwqygm:8mo/p5+dOcz26Yicd5rdPKLJVJmyg
                                                MD5:BBAC1CF89148689FAD8C800720413E79
                                                SHA1:3D3F7709A1614DD586302E20B56592E6A51CDCF1
                                                SHA-256:86F8E8B07121E317A7AD788981DE185679ABFC5E25A7B94653143B6F1FADDCEB
                                                SHA-512:BFABADEA143BF2D2B0B99EB05B8A3DA0094E4E522808CBCD130D5DE0D12359BF2D470FBA479BCCC14C489948CEBD643763FB560CE107BD20101F04608CA5C9D6
                                                Malicious:false
                                                Preview:L..................F.... .... Z......~..........V_..........................q....P.O. .:i.....+00.../C:\.....................1......Xhp..PROGRA~2.........O.I.Xhp....................V......a..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1......Xup..GU_2024.@......Xtp.Xup..............................G.U._.2.0.2.4.....T.2.....NX#w .GU.exe..>......Xtp.Xtp....).........................G.U...e.x.e.......T...............-.......S....................C:\Program Files (x86)\GU_2024\GU.exe..4.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4.\.G.U...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4.........*................@Z|...K.J.........`.......X.......724471...........hT..CrF.f4... .../Tc...,......hT..CrF.f4... .../Tc...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 16 13:03:38 2024, mtime=Tue Apr 16 13:03:38 2024, atime=Tue Apr 16 13:03:20 2024, length=3137597, window=hide
                                                Category:dropped
                                                Size (bytes):1089
                                                Entropy (8bit):4.657484306553993
                                                Encrypted:false
                                                SSDEEP:24:8miZEVdOE4qzTll/6AkYiBdR/KDdR/0UULxkJQJUwqygm:8miWVdOczhlpviBdkDdPKOJQJmyg
                                                MD5:4A9FCC368951F4A9433B41A6C930D58E
                                                SHA1:376B2406C2B14A3BB6E04C2C3BB86D03D8946260
                                                SHA-256:B7AEB7CBC65E3A6D230A73E7050B4F5646E185249D57ADAF7B3278E26450569F
                                                SHA-512:89326164C8B5B85CC58D0E9364C20B8A0B05D05B1EDA9ECA963AADA9FFEBFF69E042E5D4E81624492AC69545EB9EBA99F71164529E7A73AF16EAE689DA844374
                                                Malicious:false
                                                Preview:L..................F.... ...[oI.....[oI......SG.....=./..........................P.O. .:i.....+00.../C:\.....................1......Xtp..PROGRA~2.........O.I.Xup....................V.....S...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1......Xup..GU_2024.@......Xtp.Xup..............................G.U._.2.0.2.4.....f.2.=./..Xkp .unins000.exe..J......Xtp.Xtp..........................0]0.u.n.i.n.s.0.0.0...e.x.e.......Z...............-.......Y....................C:\Program Files (x86)\GU_2024\unins000.exe..:.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4.\.u.n.i.n.s.0.0.0...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.G.U._.2.0.2.4.........*................@Z|...K.J.........`.......X.......724471...........hT..CrF.f4... ..../Tc...,......hT..CrF.f4... ..../Tc...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.
                                                Process:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):6144
                                                Entropy (8bit):4.720366600008286
                                                Encrypted:false
                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: Emcon.Zvit.2.0.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.FileRepPup.2542.22578.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.FileRepPup.2542.22578.exe, Detection: malicious, Browse
                                                • Filename: Emcon.Zvit.2.0.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Program.Unwanted.5412.26753.681.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Program.Unwanted.5412.26753.681.exe, Detection: malicious, Browse
                                                • Filename: my0qkzrWqy.rtf, Detection: malicious, Browse
                                                • Filename: sUe62S79Mb.rtf, Detection: malicious, Browse
                                                • Filename: MDE_File_Sample_fbc11f506d4b8a1c3077fd43f6560883e512cf72.zip, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\WSNBOfCAfh.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):3113472
                                                Entropy (8bit):6.370560423548419
                                                Encrypted:false
                                                SSDEEP:49152:1WGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTb8333Hp:vtLutqgwh4NYxtJpkxhGL333J
                                                MD5:593E2893150FF847791168B00FB97039
                                                SHA1:54A8643948BACD7E8B08A83EC2899F1996DFF1D8
                                                SHA-256:884C27725E4D5067F19B25D94A5BDD11A79CC22C7354A1DA1A1DA85B60CC2906
                                                SHA-512:C2B794307103E8EDF2DA032AE1A02614B08165C5B7BCC65D39C9C18FFA27D5DBE0757D77F29E011F1F49AE7C38259D5E72DB1C03162A5BB2AC466E46DE765D9B
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 2%, Browse
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,..2......hf,......p,...@..........................p0...........@......@....................-.......-..9.......R...........................................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc....R.......T....-.............@..@..............1.......0.............@..@........................................................
                                                Process:C:\Program Files (x86)\GU_2024\GU.exe
                                                File Type:Generic INItialization configuration [TarifGUUser]
                                                Category:dropped
                                                Size (bytes):1053
                                                Entropy (8bit):5.168890085285299
                                                Encrypted:false
                                                SSDEEP:24:ubjEY+Re0Cy6BvnBBWyATJ4YgUbMs4jgO/:uc80CtvBByiY45
                                                MD5:F6B9BC3938DF32C64E9DF5BD0557234F
                                                SHA1:3351FFAEE9E238E2D1DF5D53FB5A37F8B91B391E
                                                SHA-256:BE6004A6DAB48079160EB93A5B7FB9E7FDA6C5D3A14144C80E6A189DA4976C0C
                                                SHA-512:3314A03B1EE0C71786CDFDAF7A2CE340DAB774B1621DCF4BE591A299F8F222128F48986152DBA64E0CC0E66B0708919543020EE073141659E137E379FA08C122
                                                Malicious:false
                                                Preview:[TarifGuStanard]..Caption=GU Kalkulationsgrundlage 2024..Version=V5..GuAnsVolumen=250..GuAnsFlaeche=500..GuAnsLademeter=1200..GuAnsPalette=500..GuAnsLaenger3MProz=25..GuAnsLaenger3MMax=50 ..GuAnsStockwLief=10..GuAnsStockwLiefMin=50..GuAnsLieferterminBis0900=80..GuAnsLieferterminAb0900=60..GuAnsFixTerminLieferung=80..GuAnsFixterminAbholung=80..GuAnsAbholungNach1630=80..GuAnsAdrProz=10..GuAnsAdrMin=20..GuAnsAdrMax=50..GuAnsExProz=20..GuAnsExMin=50..GuAnsExMax=130..GuAnsNNProz=2..GuAnsNNmin=30..GuAnsTreibstZuschlProz=0..GuAnsReUnterFr100=20..GuAnsAvis=5..GuAnsMwStSatz=8.1..GuAnsZusLadeSt=60..GuAnsPneuProz=55..GuAnsKuehlgutProz=20..GuAnsPalZuschlProz=0..GUmaxBerechnungKg=24000..GuMindAnsBisKm50=70..GuMindAnsBisKm100=76..GuMindAnsBisKm150=81..GuMindAnsBisKm200=87.5..GuMindAnsUeberKm200=97.5..GuAnsatzLuftfracht=20..GuAnsTerminvereinbarung=5....[TarifGUUser]..UserSprache=0..UserMwSt=8.1..UserTreibStZuschl=4..UserRabattProz=0..UserZuschlagProz=0..UserAbsFest=0..UserAbsPLZ=..UserAbsOrt=..UserPa
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.973950722865438
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 98.45%
                                                • Inno Setup installer (109748/4) 1.08%
                                                • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                File name:WSNBOfCAfh.exe
                                                File size:10'395'772 bytes
                                                MD5:bcb8cbe530f4f7be6a3901067961ad14
                                                SHA1:76c49f0c0e66746201e0598b61d46dd39747cd55
                                                SHA256:e58e25c8aef38a1bc6546aee7a5c94cb534f64d7f4fcfc937a2f5a3ad9191a5f
                                                SHA512:b6d0241c40197134ec816e9075f12bcfb248755d87a253ef324af6d7b925c7a148638d310ad64aaad78648fc9eae082b3630803df031f12f6939d69e4c7b5b09
                                                SSDEEP:196608:OUNocAkIWmbqmrDzp4/dQKATCb2ty4YIuldYnjXuaNoszlVjw8DC1n:zNocA3Wtk6FQSbCY9nDyfjJC1n
                                                TLSH:C2A6233FB2A8663ED86F4B320573935099BBBA91A51ACC1E17F4080DCF6A4701E3F655
                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                Icon Hash:9c1673b9f171239f
                                                Entrypoint:0x4b5eec
                                                Entrypoint Section:.itext
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x63ECF218 [Wed Feb 15 14:54:16 2023 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:1
                                                File Version Major:6
                                                File Version Minor:1
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:1
                                                Import Hash:e569e6f445d32ba23766ad67d1e3787f
                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                add esp, FFFFFFA4h
                                                push ebx
                                                push esi
                                                push edi
                                                xor eax, eax
                                                mov dword ptr [ebp-3Ch], eax
                                                mov dword ptr [ebp-40h], eax
                                                mov dword ptr [ebp-5Ch], eax
                                                mov dword ptr [ebp-30h], eax
                                                mov dword ptr [ebp-38h], eax
                                                mov dword ptr [ebp-34h], eax
                                                mov dword ptr [ebp-2Ch], eax
                                                mov dword ptr [ebp-28h], eax
                                                mov dword ptr [ebp-14h], eax
                                                mov eax, 004B14B8h
                                                call 00007F7B2957BB45h
                                                xor eax, eax
                                                push ebp
                                                push 004B65E2h
                                                push dword ptr fs:[eax]
                                                mov dword ptr fs:[eax], esp
                                                xor edx, edx
                                                push ebp
                                                push 004B659Eh
                                                push dword ptr fs:[edx]
                                                mov dword ptr fs:[edx], esp
                                                mov eax, dword ptr [004BE634h]
                                                call 00007F7B2961E637h
                                                call 00007F7B2961E18Ah
                                                lea edx, dword ptr [ebp-14h]
                                                xor eax, eax
                                                call 00007F7B295915E4h
                                                mov edx, dword ptr [ebp-14h]
                                                mov eax, 004C1D84h
                                                call 00007F7B29576737h
                                                push 00000002h
                                                push 00000000h
                                                push 00000001h
                                                mov ecx, dword ptr [004C1D84h]
                                                mov dl, 01h
                                                mov eax, dword ptr [004238ECh]
                                                call 00007F7B29592767h
                                                mov dword ptr [004C1D88h], eax
                                                xor edx, edx
                                                push ebp
                                                push 004B654Ah
                                                push dword ptr fs:[edx]
                                                mov dword ptr fs:[edx], esp
                                                call 00007F7B2961E6BFh
                                                mov dword ptr [004C1D90h], eax
                                                mov eax, dword ptr [004C1D90h]
                                                cmp dword ptr [eax+0Ch], 01h
                                                jne 00007F7B296248DAh
                                                mov eax, dword ptr [004C1D90h]
                                                mov edx, 00000028h
                                                call 00007F7B2959305Ch
                                                mov edx, dword ptr [004C1D90h]
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x36c8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0xc70000x36c80x3800cd37888a2076e73ef25809258409c917False0.3031529017857143data4.195989806242258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xc74380x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.271505376344086
                                                RT_STRING0xc77200x360data0.34375
                                                RT_STRING0xc7a800x260data0.3256578947368421
                                                RT_STRING0xc7ce00x45cdata0.4068100358422939
                                                RT_STRING0xc813c0x40cdata0.3754826254826255
                                                RT_STRING0xc85480x2d4data0.39226519337016574
                                                RT_STRING0xc881c0xb8data0.6467391304347826
                                                RT_STRING0xc88d40x9cdata0.6410256410256411
                                                RT_STRING0xc89700x374data0.4230769230769231
                                                RT_STRING0xc8ce40x398data0.3358695652173913
                                                RT_STRING0xc907c0x368data0.3795871559633027
                                                RT_STRING0xc93e40x2a4data0.4275147928994083
                                                RT_RCDATA0xc96880x10data1.5
                                                RT_RCDATA0xc96980x2c4data0.6384180790960452
                                                RT_RCDATA0xc995c0x2cdata1.2045454545454546
                                                RT_GROUP_ICON0xc99880x14dataEnglishUnited States1.2
                                                RT_VERSION0xc999c0x584dataEnglishUnited States0.26062322946175637
                                                RT_MANIFEST0xc9f200x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                                DLLImport
                                                kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                comctl32.dllInitCommonControls
                                                version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                                user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                                advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                                                NameOrdinalAddress
                                                TMethodImplementationIntercept30x4541a8
                                                __dbk_fcall_wrapper20x40d0a0
                                                dbkFCallWrapperAddr10x4be63c
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                No network behavior found

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:16:03:19
                                                Start date:16/04/2024
                                                Path:C:\Users\user\Desktop\WSNBOfCAfh.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\WSNBOfCAfh.exe"
                                                Imagebase:0x400000
                                                File size:10'395'772 bytes
                                                MD5 hash:BCB8CBE530F4F7BE6A3901067961AD14
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:16:03:20
                                                Start date:16/04/2024
                                                Path:C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe"
                                                Imagebase:0x400000
                                                File size:3'113'472 bytes
                                                MD5 hash:593E2893150FF847791168B00FB97039
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Antivirus matches:
                                                • Detection: 0%, ReversingLabs
                                                • Detection: 2%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:true

                                                Target ID:6
                                                Start time:16:03:42
                                                Start date:16/04/2024
                                                Path:C:\Program Files (x86)\GU_2024\GU.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\GU_2024\GU.exe"
                                                Imagebase:0xc50000
                                                File size:19'850'752 bytes
                                                MD5 hash:5E775346C19A96D094D3D23726E969F6
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Reputation:low
                                                Has exited:false

                                                Target ID:7
                                                Start time:16:03:44
                                                Start date:16/04/2024
                                                Path:C:\Windows\splwow64.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\splwow64.exe 12288
                                                Imagebase:0x7ff716130000
                                                File size:163'840 bytes
                                                MD5 hash:77DE7761B037061C7C112FD3C5B91E73
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:0.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:100%
                                                  Total number of Nodes:1
                                                  Total number of Limit Nodes:0
                                                  execution_graph 476 c61a1c GetSystemInfo

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_00C614C0 1 Function_00C612CC 2 Function_00C612CA 3 Function_00C61BC8 4 Function_00C61CD6 5 Function_00C61DD6 6 Function_00C619D4 7 Function_00C618D2 8 Function_00C618D0 9 Function_00C614DC 10 Function_00C61EDC 11 Function_00C616DA 49 Function_00C615AC 11->49 12 Function_00C61CD8 13 Function_00C613D8 47 Function_00C610A0 13->47 14 Function_00C618D8 63 Function_00C6164C 14->63 15 Function_00C61AE0 16 Function_00C61DEE 17 Function_00C61BEC 18 Function_00C61AEC 19 Function_00C613EA 20 Function_00C612F4 21 Function_00C617F4 21->63 22 Function_00C612F2 23 Function_00C61CF0 24 Function_00C61DFC 25 Function_00C619FC 26 Function_00C61AF8 27 Function_00C61082 28 Function_00C61383 29 Function_00C61080 30 Function_00C61381 31 Function_00C61E8E 32 Function_00C61D8A 33 Function_00C61D88 34 Function_00C61488 35 Function_00C61594 36 Function_00C61394 37 Function_00C61A94 38 Function_00C61392 39 Function_00C61592 40 Function_00C61792 40->63 41 Function_00C61B90 42 Function_00C61D90 43 Function_00C61C9C 44 Function_00C61D9C 45 Function_00C61498 46 Function_00C61EA6 48 Function_00C613A0 48->36 49->6 50 Function_00C61AAC 51 Function_00C615AA 51->6 52 Function_00C61EA8 53 Function_00C61DA8 54 Function_00C61CB4 55 Function_00C61DB4 56 Function_00C61BB0 57 Function_00C614BE 58 Function_00C61EBC 59 Function_00C61546 60 Function_00C61E44 61 Function_00C61C40 62 Function_00C61F40 63->25 64 Function_00C61F4C 85 Function_00C61F70 64->85 65 Function_00C61548 66 Function_00C61B48 67 Function_00C61854 67->63 68 Function_00C61554 69 Function_00C61552 70 Function_00C6155E 71 Function_00C6145C 72 Function_00C6175C 72->49 73 Function_00C6195C 74 Function_00C61E58 75 Function_00C61158 76 Function_00C61560 77 Function_00C61C60 78 Function_00C61A6D 79 Function_00C61468 80 Function_00C61B68 81 Function_00C61B76 82 Function_00C61E74 83 Function_00C61A74 84 Function_00C61E72 85->6 112 Function_00C61B34 85->112 86 Function_00C6147C 87 Function_00C61A7C 88 Function_00C61B78 89 Function_00C61C78 90 Function_00C61A78 91 Function_00C61C04 92 Function_00C61B04 93 Function_00C61002 94 Function_00C61408 94->13 95 Function_00C61F08 96 Function_00C61216 97 Function_00C61214 98 Function_00C61D14 99 Function_00C61E14 100 Function_00C61D12 101 Function_00C61A1C 102 Function_00C61B1C 103 Function_00C61E20 104 Function_00C61520 105 Function_00C6192C 105->21 106 Function_00C61D2C 107 Function_00C61C28 108 Function_00C61F28 109 Function_00C61236 110 Function_00C61E36 111 Function_00C61134 113 Function_00C61132 114 Function_00C61432 114->48 114->94 115 Function_00C61A30 116 Function_00C6193E 116->14 117 Function_00C61238

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 c61a1c-c61a2c GetSystemInfo
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.2566041626.0000000000C61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00C61000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_c61000_GU.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem
                                                  • String ID:
                                                  • API String ID: 31276548-0
                                                  • Opcode ID: 0c33aed5efc42ad5231741cc79179ac2514bf68093440e7807e6f9660c35852d
                                                  • Instruction ID: 03cd960579005e24436c0a2d57b7c9685d72f568493617db1dba3ad00c8c421b
                                                  • Opcode Fuzzy Hash: 0c33aed5efc42ad5231741cc79179ac2514bf68093440e7807e6f9660c35852d
                                                  • Instruction Fuzzy Hash: 6CA012544098000EC404E7184C4340F35801A41110FC40210B85CA5392EA0585A803DB
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%