Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rJustificante67.exe

Overview

General Information

Sample name:rJustificante67.exe
Analysis ID:1617433
MD5:96bc48e7cc38d731e7e2c25f3f80a88e
SHA1:bd30afd2f438928b3cb98d9f74766f1e401db091
SHA256:79714172680d9fd5b1d49fc518abe9cef9200194a04b6611466beccb28c31728
Tags:exenjratuser-Porcupine
Infos:

Detection

GuLoader, Snake Keylogger
Score:88
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • rJustificante67.exe (PID: 4828 cmdline: "C:\Users\user\Desktop\rJustificante67.exe" MD5: 96BC48E7CC38D731E7E2C25F3F80A88E)
    • rJustificante67.exe (PID: 3428 cmdline: "C:\Users\user\Desktop\rJustificante67.exe" MD5: 96BC48E7CC38D731E7E2C25F3F80A88E)
      • WerFault.exe (PID: 2832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 2548 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Token": "7809339088:AAEUtMa_u0dd_zBfAWh2Ah2az4h6hNs_Wg0", "Chat_id": "7618581100", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000006.00000002.2730568468.000000000185C000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000000.00000002.2612554748.000000000333C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-02-17T23:02:12.643085+010028032702Potentially Bad Traffic192.168.2.649969142.250.185.78443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7809339088:AAEUtMa_u0dd_zBfAWh2Ah2az4h6hNs_Wg0", "Chat_id": "7618581100", "Version": "4.4"}
        Source: rJustificante67.exeReversingLabs: Detection: 32%
        Source: rJustificante67.exeVirustotal: Detection: 23%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: rJustificante67.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 142.250.185.78:443 -> 192.168.2.6:49969 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.6:49976 version: TLS 1.2
        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr
        Source: Binary string: n0C:\Windows\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.pdbd source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Configuration.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Configuration.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.pdbFg# source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Xml.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Core.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Windows.Forms.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2760384709.000000003580E000.00000004.00000020.00020000.00000000.sdmp, WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Users\user\Desktop\rJustificante67.PDBXs< source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: 5%%.pdb source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4393.tmp.dmp.9.dr
        Source: Binary string: C:\Users\user\Desktop\rJustificante67.PDB source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Core.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr
        Source: C:\Users\user\Desktop\rJustificante67.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_00402706 FindFirstFileW,6_2_00402706
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_00405731
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_004061E5 FindFirstFileW,FindClose,6_2_004061E5
        Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49969 -> 142.250.185.78:443
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: drive.google.com
        Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032F43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032F2D000.00000004.00000800.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000002.2759965563.0000000032F43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: rJustificante67.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
        Source: rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
        Source: rJustificante67.exe, 00000006.00000002.2732658686.0000000002938000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
        Source: rJustificante67.exe, 00000006.00000002.2759412293.0000000031FB0000.00000004.00001000.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000002.2732658686.0000000002970000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV
        Source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000002.2732658686.000000000298E000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV&export=download
        Source: rJustificante67.exe, 00000006.00000003.2680303299.00000000029A1000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000002.2732658686.00000000029A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1nDB7ry8SARfoQUp67ibCPOyNMq9q_OUV&export=downloadR
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
        Source: rJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49969
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
        Source: unknownHTTPS traffic detected: 142.250.185.78:443 -> 192.168.2.6:49969 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.6:49976 version: TLS 1.2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00405295 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405295
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040331C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,6_2_0040331C
        Source: C:\Users\user\Desktop\rJustificante67.exeFile created: C:\Windows\resources\0809Jump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00404AD20_2_00404AD2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_004064F70_2_004064F7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_00404AD26_2_00404AD2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_004064F76_2_004064F7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E096A6_2_016E096A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E116B6_2_016E116B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E21666_2_016E2166
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E157D6_2_016E157D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0D786_2_016E0D78
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E19766_2_016E1976
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E194C6_2_016E194C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E09446_2_016E0944
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1D5B6_2_016E1D5B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11586_2_016E1158
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0D576_2_016E0D57
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E15206_2_016E1520
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E213F6_2_016E213F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E153C6_2_016E153C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0D3A6_2_016E0D3A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1D336_2_016E1D33
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11316_2_016E1131
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0D076_2_016E0D07
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E211C6_2_016E211C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E09156_2_016E0915
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11126_2_016E1112
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1D126_2_016E1D12
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E19EF6_2_016E19EF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1DEF6_2_016E1DEF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E21FE6_2_016E21FE
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0DFD6_2_016E0DFD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E15F96_2_016E15F9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11F96_2_016E11F9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E19CF6_2_016E19CF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E15CC6_2_016E15CC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0DC86_2_016E0DC8
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1DC96_2_016E1DC9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11C56_2_016E11C5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E21DF6_2_016E21DF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0DDC6_2_016E0DDC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E09D76_2_016E09D7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E09AE6_2_016E09AE
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E19AD6_2_016E19AD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0DA46_2_016E0DA4
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E15A26_2_016E15A2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1DB86_2_016E1DB8
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E21B16_2_016E21B1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E218F6_2_016E218F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E11896_2_016E1189
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1D846_2_016E1D84
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E09976_2_016E0997
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E19906_2_016E1990
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E006D6_2_016E006D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1C686_2_016E1C68
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20686_2_016E2068
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10666_2_016E1066
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E18726_2_016E1872
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08736_2_016E0873
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C736_2_016E0C73
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E004E6_2_016E004E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E144F6_2_016E144F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E204A6_2_016E204A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20486_2_016E2048
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1C466_2_016E1C46
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10416_2_016E1041
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E005F6_2_016E005F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C576_2_016E0C57
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E142F6_2_016E142F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08286_2_016E0828
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10286_2_016E1028
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1C226_2_016E1C22
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20216_2_016E2021
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E083E6_2_016E083E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E203E6_2_016E203E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E183C6_2_016E183C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C396_2_016E0C39
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C306_2_016E0C30
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E000B6_2_016E000B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C096_2_016E0C09
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E18166_2_016E1816
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08126_2_016E0812
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E00126_2_016E0012
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1CE96_2_016E1CE9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10E76_2_016E10E7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0CE26_2_016E0CE2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E18F66_2_016E18F6
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20F46_2_016E20F4
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08F06_2_016E08F0
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10CF6_2_016E10CF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1CCC6_2_016E1CCC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E18DC6_2_016E18DC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08DA6_2_016E08DA
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20D16_2_016E20D1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E10AC6_2_016E10AC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E14A76_2_016E14A7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E08A56_2_016E08A5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E18BE6_2_016E18BE
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E20BB6_2_016E20BB
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0CB96_2_016E0CB9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E14B96_2_016E14B9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E208C6_2_016E208C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E14886_2_016E1488
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E109D6_2_016E109D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E189D6_2_016E189D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1C9A6_2_016E1C9A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0C926_2_016E0C92
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E176E6_2_016E176E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E136D6_2_016E136D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0F696_2_016E0F69
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1F636_2_016E1F63
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0B786_2_016E0B78
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0B4F6_2_016E0B4F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1B4F6_2_016E1B4F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E134C6_2_016E134C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0F486_2_016E0F48
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1F486_2_016E1F48
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E17416_2_016E1741
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0B2D6_2_016E0B2D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E172A6_2_016E172A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1B206_2_016E1B20
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1F3C6_2_016E1F3C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E23386_2_016E2338
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13356_2_016E1335
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1F0B6_2_016E1F0B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13096_2_016E1309
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1B096_2_016E1B09
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0B036_2_016E0B03
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E231A6_2_016E231A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0F156_2_016E0F15
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1BE06_2_016E1BE0
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13FF6_2_016E13FF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1BFF6_2_016E1BFF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0FFC6_2_016E0FFC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1FF76_2_016E1FF7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E17F16_2_016E17F1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13CD6_2_016E13CD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1FCA6_2_016E1FCA
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E07C26_2_016E07C2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E17C06_2_016E17C0
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0FC16_2_016E0FC1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E07DF6_2_016E07DF
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0BDD6_2_016E0BDD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E17D76_2_016E17D7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0FD56_2_016E0FD5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E07AC6_2_016E07AC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13AD6_2_016E13AD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0BAB6_2_016E0BAB
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1FA76_2_016E1FA7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1BB06_2_016E1BB0
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1F806_2_016E1F80
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E13926_2_016E1392
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E17936_2_016E1793
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E166C6_2_016E166C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1A6A6_2_016E1A6A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22676_2_016E2267
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1E7B6_2_016E1E7B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0E786_2_016E0E78
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A716_2_016E0A71
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1A4D6_2_016E1A4D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0E5B6_2_016E0E5B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E12596_2_016E1259
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E16576_2_016E1657
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1E576_2_016E1E57
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A506_2_016E0A50
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E162A6_2_016E162A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A2A6_2_016E0A2A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0E2B6_2_016E0E2B
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A256_2_016E0A25
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E223D6_2_016E223D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1E3A6_2_016E1E3A
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E12346_2_016E1234
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1A326_2_016E1A32
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E160F6_2_016E160F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E12086_2_016E1208
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A096_2_016E0A09
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22186_2_016E2218
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1A176_2_016E1A17
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1E116_2_016E1E11
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1AE96_2_016E1AE9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E12E06_2_016E12E0
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0AE16_2_016E0AE1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E16FC6_2_016E16FC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0EF76_2_016E0EF7
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22F46_2_016E22F4
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1EF56_2_016E1EF5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22CA6_2_016E22CA
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0AC96_2_016E0AC9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0EC96_2_016E0EC9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1AC66_2_016E1AC6
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E16D86_2_016E16D8
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1ED26_2_016E1ED2
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1EA86_2_016E1EA8
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0EA96_2_016E0EA9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22A96_2_016E22A9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E12A16_2_016E12A1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E128E6_2_016E128E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E168D6_2_016E168D
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E22866_2_016E2286
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E1A986_2_016E1A98
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E0A996_2_016E0A99
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_025E3AA16_2_025E3AA1
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_025E29EC6_2_025E29EC
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: String function: 00402AD0 appears 51 times
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 2548
        Source: rJustificante67.exeStatic PE information: invalid certificate
        Source: rJustificante67.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal88.troj.evad.winEXE@4/22@3/3
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_0040458C GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040458C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_0040206A
        Source: C:\Users\user\Desktop\rJustificante67.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierministerJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeMutant created: NULL
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3428
        Source: C:\Users\user\Desktop\rJustificante67.exeFile created: C:\Users\user\AppData\Local\Temp\nsv7249.tmpJump to behavior
        Source: rJustificante67.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\rJustificante67.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: rJustificante67.exeReversingLabs: Detection: 32%
        Source: rJustificante67.exeVirustotal: Detection: 23%
        Source: C:\Users\user\Desktop\rJustificante67.exeFile read: C:\Users\user\Desktop\rJustificante67.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\rJustificante67.exe "C:\Users\user\Desktop\rJustificante67.exe"
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess created: C:\Users\user\Desktop\rJustificante67.exe "C:\Users\user\Desktop\rJustificante67.exe"
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 2548
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess created: C:\Users\user\Desktop\rJustificante67.exe "C:\Users\user\Desktop\rJustificante67.exe"Jump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: stempelpudernes.lnk.0.drLNK file: ..\Pictures\muringerne\giggliest.pha
        Source: dinosaurusserne.lnk.0.drLNK file: ..\..\..\..\Users\Public\Pictures\eksistensberettigelsen.pre
        Source: C:\Users\user\Desktop\rJustificante67.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr
        Source: Binary string: n0C:\Windows\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.pdbd source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Configuration.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Configuration.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.pdbFg# source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Xml.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Core.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Windows.Forms.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2760384709.000000003580E000.00000004.00000020.00020000.00000000.sdmp, WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2732658686.00000000029F6000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Users\user\Desktop\rJustificante67.PDBXs< source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rJustificante67.exe, 00000006.00000002.2760342209.00000000357B0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.Core.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: 5%%.pdb source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4393.tmp.dmp.9.dr
        Source: Binary string: C:\Users\user\Desktop\rJustificante67.PDB source: rJustificante67.exe, 00000006.00000002.2759816390.0000000032CB7000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: System.ni.pdb source: WER4393.tmp.dmp.9.dr
        Source: Binary string: System.Core.ni.pdbRSDS source: WER4393.tmp.dmp.9.dr

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000006.00000002.2730568468.000000000185C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2612554748.000000000333C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_10002D50 push eax; ret 0_2_10002D7E
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E5162 push es; iretd 6_2_016E5170
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E5174 push ss; retf 6_2_016E51D9
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E6944 pushad ; iretd 6_2_016E6945
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E4938 push 96898B87h; ret 6_2_016E493F
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E2C7F push es; ret 6_2_016E2C87
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E58ED push es; retf 6_2_016E58F3
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E68AE push ss; retf 6_2_016E68CD
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E2C8B push es; ret 6_2_016E2C87
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_016E472A push dword ptr [ecx+7Eh]; ret 6_2_016E4738

        Persistence and Installation Behavior

        barindex
        Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer matches subject exactly) which is not trusted by system. 2) Organization 'Bevismateriales' is not a known legitimate company. 3) Email domain 'Carbolxylol.Vau' is highly suspicious and not a legitimate business domain. 4) Large time gap between compilation date (2013) and certificate creation (2024) suggests possible tampering. 5) The OU field 'Tegnvise servicekontrakter' appears to be in Danish/Norwegian while location is in Wales, GB - showing inconsistency. 6) Certificate validation explicitly fails with untrusted root error. 7) Organization name 'Bevismateriales' appears to be a mix of different languages, which is highly unusual for a legitimate business. The combination of self-signed certificate, suspicious domain, failed validation, and inconsistent location/language patterns strongly suggests this is a malicious file.
        Source: C:\Users\user\Desktop\rJustificante67.exeFile created: C:\Users\user\AppData\Local\Temp\nsc77E8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\rJustificante67.exeAPI/Special instruction interceptor: Address: 38CF59C
        Source: C:\Users\user\Desktop\rJustificante67.exeAPI/Special instruction interceptor: Address: 1DEF59C
        Source: C:\Users\user\Desktop\rJustificante67.exeRDTSC instruction interceptor: First address: 38A4CF4 second address: 38A4CF4 instructions: 0x00000000 rdtsc 0x00000002 cmp bx, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FD758764A97h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\rJustificante67.exeRDTSC instruction interceptor: First address: 1DC4CF4 second address: 1DC4CF4 instructions: 0x00000000 rdtsc 0x00000002 cmp bx, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FD759412FC7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\rJustificante67.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeMemory allocated: 32E80000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeMemory allocated: 32B10000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc77E8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_00402706 FindFirstFileW,6_2_00402706
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_00405731
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 6_2_004061E5 FindFirstFileW,FindClose,6_2_004061E5
        Source: Amcache.hve.9.drBinary or memory string: VMware
        Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
        Source: rJustificante67.exe, 00000006.00000002.2732658686.000000000298E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.9.drBinary or memory string: vmci.sys
        Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: rJustificante67.exe, 00000006.00000002.2732658686.0000000002938000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH^
        Source: Amcache.hve.9.drBinary or memory string: VMware20,1
        Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\rJustificante67.exeAPI call chain: ExitProcess graph end nodegraph_0-4472
        Source: C:\Users\user\Desktop\rJustificante67.exeAPI call chain: ExitProcess graph end nodegraph_0-4471
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00402D52 GetTempPathW,GetTickCount,GetModuleFileNameW,GetFileSize,LdrInitializeThunk,LdrInitializeThunk,GlobalAlloc,CreateFileW,LdrInitializeThunk,0_2_00402D52
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeProcess created: C:\Users\user\Desktop\rJustificante67.exe "C:\Users\user\Desktop\rJustificante67.exe"Jump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeQueries volume information: C:\Users\user\Desktop\rJustificante67.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\rJustificante67.exeCode function: 0_2_00405EC4 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405EC4
        Source: C:\Users\user\Desktop\rJustificante67.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
        Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\rJustificante67.exeDirectory queried: number of queries: 1001

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        11
        Process Injection
        11
        Masquerading
        OS Credential Dumping221
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        2
        Virtualization/Sandbox Evasion
        LSASS Memory2
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Disable or Modify Tools
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDS1
        System Network Configuration Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets12
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
        Obfuscated Files or Information
        Cached Domain Credentials214
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        rJustificante67.exe32%ReversingLabsWin32.Trojan.Guloader
        rJustificante67.exe24%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsc77E8.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsc77E8.tmp\System.dll0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        142.250.185.78
        truefalse
          high
          drive.usercontent.google.com
          216.58.212.129
          truefalse
            high
            checkip.dyndns.com
            132.226.8.169
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://aborters.duckdns.org:8081rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.google.comrJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://drive.google.com/rJustificante67.exe, 00000006.00000002.2732658686.0000000002938000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://anotherarmy.dns.army:8081rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://drive.usercontent.google.com/rJustificante67.exe, 00000006.00000002.2732658686.00000000029A1000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://upx.sf.netAmcache.hve.9.drfalse
                              high
                              http://checkip.dyndns.orgrJustificante67.exe, 00000006.00000002.2759965563.0000000032F2D000.00000004.00000800.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000002.2759965563.0000000032F43000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://apis.google.comrJustificante67.exe, 00000006.00000003.2643629028.00000000029A6000.00000004.00000020.00020000.00000000.sdmp, rJustificante67.exe, 00000006.00000003.2643709302.00000000029A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.comrJustificante67.exe, 00000006.00000002.2759965563.0000000032F43000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://nsis.sf.net/NSIS_ErrorErrorrJustificante67.exefalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://varders.kozow.com:8081rJustificante67.exe, 00000006.00000002.2759965563.0000000032E81000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          132.226.8.169
                                          checkip.dyndns.comUnited States
                                          16989UTMEMUSfalse
                                          142.250.185.78
                                          drive.google.comUnited States
                                          15169GOOGLEUSfalse
                                          216.58.212.129
                                          drive.usercontent.google.comUnited States
                                          15169GOOGLEUSfalse
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1617433
                                          Start date and time:2025-02-17 23:00:26 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 34s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:14
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:rJustificante67.exe
                                          Detection:MAL
                                          Classification:mal88.troj.evad.winEXE@4/22@3/3
                                          EGA Information:
                                          • Successful, ratio: 50%
                                          HCA Information:
                                          • Successful, ratio: 89%
                                          • Number of executed functions: 66
                                          • Number of non-executed functions: 75
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 52.182.143.212, 13.107.246.45, 4.245.163.56, 40.126.31.128, 40.126.32.140
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target rJustificante67.exe, PID 3428 because it is empty
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          TimeTypeDescription
                                          17:02:19API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          132.226.8.169REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                          • checkip.dyndns.org/
                                          pfYNBAkPIwsCPTS.exeGet hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          ORDER 3447743843.pdf.exeGet hashmaliciousGuLoaderBrowse
                                          • checkip.dyndns.org/
                                          QUOTATION_JANQUOTE312025#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                          • checkip.dyndns.org/
                                          E_DKONT.cmdGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          000999374847565342.exeGet hashmaliciousGuLoaderBrowse
                                          • checkip.dyndns.org/
                                          130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          foreign.ps1Get hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          kduYCOzG3unrjuS.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          MAERSK Shipping Document - Bill of Lading - SWB Receipt - Packing List_PDF.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          checkip.dyndns.comSecuriteInfo.com.Win32.Trojan-Downloader.GuLoader.QAKJ8V.27372.733.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 193.122.6.168
                                          mMS2hfsyJd.imgGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                          • 132.226.8.169
                                          Nonmerchantable.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          PH9876509487650000.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 193.122.130.0
                                          pfYNBAkPIwsCPTS.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          JUSTIFICANTE DE TRANSFERENCIA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          SHIP INFORMATIONS.exeGet hashmaliciousMassLogger RATBrowse
                                          • 158.101.44.242
                                          AWB_5771388044 Documenti di spedizione.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 193.122.6.168
                                          JUSTIF. PAGO AQUISGRANpdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 193.122.130.0
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          UTMEMUSmMS2hfsyJd.imgGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                          • 132.226.8.169
                                          Nonmerchantable.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          pfYNBAkPIwsCPTS.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          JUSTIFICANTE DE TRANSFERENCIA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          Hermaean.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          ORDER 3447743843.pdf.exeGet hashmaliciousGuLoaderBrowse
                                          • 132.226.8.169
                                          24602711 OR Invoice.pdf.scrGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          QUOTATION_JANQUOTE312025#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                          • 132.226.8.169
                                          E_DKONT.cmdGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.8.169
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.W32.PossibleThreat.6050.24821.exeGet hashmaliciousUnknownBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          SecuriteInfo.com.Win32.Trojan-Downloader.GuLoader.QAKJ8V.27372.733.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          SecuriteInfo.com.W32.PossibleThreat.6050.24821.exeGet hashmaliciousUnknownBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          ZIOpctBE0o.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          RFQ_SRC02252017-pdf.scr.exeGet hashmaliciousGuLoaderBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          RFQ_SRC02252017-pdf.scr.exeGet hashmaliciousGuLoaderBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          Nonmerchantable.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          Payment_Swift Copy_ TXR077901844095342_pdf.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          updater.exeGet hashmaliciousVidarBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          Request for Quotation TX00171164_pdf.exeGet hashmaliciousGuLoaderBrowse
                                          • 142.250.185.78
                                          • 216.58.212.129
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\nsc77E8.tmp\System.dllkvk78zDZTu.exeGet hashmaliciousGuLoaderBrowse
                                            kvk78zDZTu.exeGet hashmaliciousGuLoaderBrowse
                                              RFQ- PO#0224-HANYOUNG Project REV03 -SUPPLY.com.exeGet hashmaliciousGuLoaderBrowse
                                                RFQ- PO#0224-HANYOUNG Project REV03 -SUPPLY.com.exeGet hashmaliciousGuLoaderBrowse
                                                  KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exeGet hashmaliciousGuLoaderBrowse
                                                    KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exeGet hashmaliciousGuLoaderBrowse
                                                      Lj4maSom2B.exeGet hashmaliciousGuLoaderBrowse
                                                        Lj4maSom2B.exeGet hashmaliciousGuLoaderBrowse
                                                          HW#210872-218YAT-THEON-GLOBAL-Y801823-1AHEY361-APL38102823-19011.exeGet hashmaliciousGuLoader, PureLog Stealer, zgRATBrowse
                                                            HW#210872-218YAT-THEON-GLOBAL-Y801823-1AHEY361-APL38102823-19011.exeGet hashmaliciousGuLoaderBrowse
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                              Category:dropped
                                                              Size (bytes):1102
                                                              Entropy (8bit):3.368966428470708
                                                              Encrypted:false
                                                              SSDEEP:12:8wl0/sXUd9CjXffJ1AM4YqicoRQ9mAYlficoRQ9yDQ1olfW+kjcmAwACBMmLIEAV:8gffJ1zqojlfoHcizZiACnLuRqy
                                                              MD5:677CBBF36889BC6C42276B542F38F6BB
                                                              SHA1:F7F14CEFDD485AE77E4A1E6C6D3EF5007BAD3E9E
                                                              SHA-256:CFACB1F777A74082C6B5A3AEAC8A0E2E84484BD2240A405054AFB8732B1CA04E
                                                              SHA-512:9A194DE2501ED99D31587DB420B9E6A51510C01208B76F91F42C563B7B4F5337C6F0F3E6F4E703BD816EC61FE8DCDD65F0BB2BE655D842078BF168FDB12253F0
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........Public..>............................................P.u.b.l.i.c.....Z.1...........Pictures..B............................................P.i.c.t.u.r.e.s.......2...........eksistensberettigelsen.pre..f............................................e.k.s.i.s.t.e.n.s.b.e.r.e.t.t.i.g.e.l.s.e.n...p.r.e...*...<.....\.....\.....\.....\.U.s.e.r.s.\.P.u.b.l.i.c.\.P.i.c.t.u.r.e.s.\.e.k.s.i.s.t.e.n.s.b.e.r.e.t.t.i.g.e.l.s.e.n...p.r.e...C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.p.r.e.m.i.e.r.m.i.n.i.s.t.e.r.\.r.a.a.s.t.o.f.i.n.d.v.i.n.d.i.n.g.e.r.\.p.u.l.p.i.t.i.c.a.l.\.F.u.r.c.i.f.o.r.m.\.U.l.i.g.e.v.g.t.e.n.........6...+...............i<A..O..|.+...............1SPS.XF.L8C....&.m.q............/...S.-.1.
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):65536
                                                              Entropy (8bit):1.221470335590497
                                                              Encrypted:false
                                                              SSDEEP:192:fbhdfZJT0BU/Ijuc3GNqmKzuiFQZ24IO83:9dfZJABU/Ij4qmKzuiFQY4IO83
                                                              MD5:9DC9A46D805752AD703FBDE77A1D6DEF
                                                              SHA1:832E0C6799807764B56FE6DF6AD07A8EC1FDFC45
                                                              SHA-256:1063AE3D3ECA68047123E7FFD892790FCC7F4D6506343ADFD02DA5DFF92F9835
                                                              SHA-512:386D790155FC17CA301C816DF03AE1A1758C196AEDBD5FC756C4E35BFB0497CB0D8D8A644E1A2F95C94C0A320723D48B34E2A0E9F102F56A266588A5F4F076AA
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.4.3.0.3.3.3.7.3.2.8.1.0.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.4.3.0.3.3.3.7.9.3.7.4.6.1.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.a.d.8.9.c.2.-.4.d.5.1.-.4.9.d.3.-.b.6.5.0.-.e.8.f.c.1.5.a.3.e.9.2.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.9.f.a.9.7.d.-.2.e.5.e.-.4.f.9.f.-.8.f.0.0.-.3.0.f.d.d.b.e.c.8.5.5.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.J.u.s.t.i.f.i.c.a.n.t.e.6.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.6.4.-.0.0.0.1.-.0.0.1.5.-.1.3.3.c.-.c.9.9.5.8.7.8.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.e.0.e.6.6.e.4.c.c.2.c.0.4.0.2.b.d.6.d.e.1.a.f.4.d.e.4.6.6.e.e.0.0.0.0.0.9.0.4.!.0.0.0.0.b.d.3.0.a.f.d.2.f.4.3.8.9.2.8.b.3.c.b.9.8.d.9.f.7.4.7.6.6.f.1.e.4.0.1.d.b.0.9.1.!.r.J.u.s.t.i.f.i.c.a.n.t.e.6.7...e.x.e...
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Mini DuMP crash report, 14 streams, Mon Feb 17 22:02:17 2025, 0x1205a4 type
                                                              Category:dropped
                                                              Size (bytes):286887
                                                              Entropy (8bit):3.7546663402284453
                                                              Encrypted:false
                                                              SSDEEP:3072:5UQ4vfABf0roD0YDD4uEqmLTgl9dy5zIv/R:5Ivo50u06D4JTgXdy5zo
                                                              MD5:0E7EAEEDE2A5BAF5B9C667B78896B5CF
                                                              SHA1:92D29042F122245632D01E7DBCEE76FA24725EBE
                                                              SHA-256:CD909D9950A5E669293BDCA817FA856B7185B00AF4C471C33DA00E0685E381C4
                                                              SHA-512:4E9A54C67733CC57E52CF579392DB2510ECBAED06A909CF9619D7D5C2CA6E101912B527DCB6DBD2B6E3ECDC82F678145A8EEF8732AFD8C3C4F9044FA276C9574
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:MDMP..a..... ........g........................."..........T%...b..........T.......8...........T...........pc..7...........H,..........4...............................................................................eJ..............GenuineIntel............T.......d.....g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):6352
                                                              Entropy (8bit):3.7235325685889262
                                                              Encrypted:false
                                                              SSDEEP:192:R6l7wVeJMjz6Ir59Yz40pdKprr89bXcsf19m:R6lXJ2z6IrDYz40pdjXvf+
                                                              MD5:B2B08F24B62AE4C6E5D770091D2E685A
                                                              SHA1:4DA92B6EDC3272F01A7E643339CA0476D48F3C63
                                                              SHA-256:E73DE31445FADCC62D559C01A9FEC66588D09E71D81BE8AE888EFB06BC81C003
                                                              SHA-512:4AEA779736DD81CBD1A71A1CE226B6DC9F62988B6B33ABB09DFECD8C7D9FCC1A3E9B2C8398709BD8F07DE05EF4F44A606D92C45F67311B75A325BE2312508804
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.2.8.<./.P.i.
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):4624
                                                              Entropy (8bit):4.490221052047007
                                                              Encrypted:false
                                                              SSDEEP:48:cvIwWl8zsNJg77aI91PGJP9WpW8VYI5Ym8M4JPjFl+q8lKZZHtI1d:uIjfnI7DGBM7VAJzZTHtI1d
                                                              MD5:D90DACCB6937071EEBAA62C840C48AB3
                                                              SHA1:A57CA94470C90E4E507B8884EE361AFBAE9122F6
                                                              SHA-256:1CD46B1D8648BA84F79D85727E470941359C0DF2AB378654543B5D9BE8B6AFF9
                                                              SHA-512:34D2CFFE1CAA4E7705F864F12A4396DC1809CD96059A69DFDAFD29AC2E050674FA1BBF2E38DF4DA8BA0245F9594BBB8EE16B8FB34A85F6C1E80B0B52BE1FB613
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="725104" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                              Category:dropped
                                                              Size (bytes):1110
                                                              Entropy (8bit):3.2824532571854896
                                                              Encrypted:false
                                                              SSDEEP:12:8wl0Y0sXUd9CjXffJegKLkpNqgwOQ1olfW+kjcmAwACBMmLIEAZqvMNhvN4t2YZ2:80XffJwLhg6izZiACnLuRqy
                                                              MD5:8EEE99D4A0B6C7993226489D1A375A18
                                                              SHA1:F9D4D7C4A46957462875646B5FCBA07F4B5223F3
                                                              SHA-256:9D5DE87C37D3996E898A85A4C6381E21D3F1EDBA42CA781DDA932327613BAF4F
                                                              SHA-512:BED87F08ABCC321C48F1BB44B04B6796B85FFC7EE3243BB9C77DA186FB8F85E17D006DCCB30443C7FD8F6FE4F0492CCC7425349A382573C3BD5A0CB8925E4709
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........Public..>............................................P.u.b.l.i.c.....Z.1...........Pictures..B............................................P.i.c.t.u.r.e.s.....`.1...........muringerne..F............................................m.u.r.i.n.g.e.r.n.e.....h.2...........giggliest.pha.L............................................g.i.g.g.l.i.e.s.t...p.h.a.......$.....\.P.i.c.t.u.r.e.s.\.m.u.r.i.n.g.e.r.n.e.\.g.i.g.g.l.i.e.s.t...p.h.a...C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.p.r.e.m.i.e.r.m.i.n.i.s.t.e.r.\.r.a.a.s.t.o.f.i.n.d.v.i.n.d.i.n.g.e.r.\.p.u.l.p.i.t.i.c.a.l.\.F.u.r.c.i.f.o.r.m.\.U.l.i.g.e.v.g.t.e.n.........6...+...............i<A..O..|.+...............1SPS.XF.L8C....&.m.q............/.
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):221709
                                                              Entropy (8bit):7.514998960878998
                                                              Encrypted:false
                                                              SSDEEP:6144:Ko2WIa8VSyNdF7kS7KRC3Gv+lex9PdU/s/FzZ:r25pNfzX3WKexQOV
                                                              MD5:38F2E90E6DE74C553F8BBB38F0244D1B
                                                              SHA1:6B1A084A6DC5B4A772F06F93C218652AC0720117
                                                              SHA-256:EF2794CD7EEEC9BB828882B527870D78CC99905C0C9FDB84E3254780BC41E65A
                                                              SHA-512:15BE278E1E27B2EAC96DA866452BA2CF327215D59D5F857B084B85D6268CE3B13DFFE8440D931445169BAE3516464707DC2B435E9F09D3D846F9420063B1879B
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:....<<.............................B...E......XX.......7...........2....nn...m...............kkk...TT......................kk.........]]]]]........................>>>>................^^^....a....3.....mm.X..7.""...q....................................SS.......L.;;.............f....))......................jjjj..8888.....SS............i...+..........q.............rrr.........t.MM......(...QQQ.....VV....................................k............~...[.;..........R..........Z.......E.....222........GG.....\\\\.......QQQ.......======.....Z.`.........................e.w....(((...........................oo.......===...QQ.nnn.........[...........GGG....._...................Y.....''.................{{{{.....C.......................s...C........=...)......^............................t..MM..2...........L..9999................................v......Y.............L...................T...nn.j..............xx.........................HHHH.....V..........B.++.,....```............2....._.......>>>>>.
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:Generic INItialization configuration [incloses doughty]
                                                              Category:dropped
                                                              Size (bytes):420
                                                              Entropy (8bit):4.702803069676154
                                                              Encrypted:false
                                                              SSDEEP:12:XgpLd7MRUs+VRKdHOdx/fzVH17PwhGxMXvChUmy:XZGs+VRKFixXztFpMfZ
                                                              MD5:6E29BCEB9974EE689D56F5005BB7202D
                                                              SHA1:6D5B9D63D6D719E2DFE25F4E6B297CA81E2F2FDC
                                                              SHA-256:7007387B5476A98D8A424A65E192D3D9482F81A71C4A6F6A6514599B22815CBB
                                                              SHA-512:D735445B88A04B231FA39280675F140F1146B458217DDF0639917C7DEEB0FF325D34FB17350CC20FC23764C58EDB53346EC06CAF814E496389419FA8AA0B5F49
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:[SCHUH ENLACEMENT]..relandscaping bluffere sminkekrukkes mesopodial hydrographers tobenet premonitor aartiernes storting steppingstones diskrediteringers.Spillemesteren subcommissary velmagtstiden bromme ytterite tistykspakke karduserne trykimprgnerede gribefladens..;denumerantive frescoing caplet inkaminations timbers chiricahua.Heppendes jannys staldkarles autocondensation..[incloses doughty]..[ECCOPROTIC UNBRAN]..
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):443676
                                                              Entropy (8bit):2.652018041102202
                                                              Encrypted:false
                                                              SSDEEP:3072:I1VJR8UkRwVYia11gYMVzXnneaxyGlgLy8HtjQ1X:I1VJR8UGCYn11gYMVTeey8gLy8HFQd
                                                              MD5:33D4D1E2F52F64A73AB14A34F13ED21B
                                                              SHA1:51EE59D65B136B6D841A39FCC5A694D16042EFA4
                                                              SHA-256:3A5855ECF29D4B079886EC646D25E591E7F4F1F56899E11442260493E43DD7DD
                                                              SHA-512:6445F1D16D58BC280912899688B3C6B20A1125E4E7FF5EB66A130FD2C5A1FC33A35BF5F6F6FA9E19E1B17148A5602BA4F7BAC33D22D1484897E097E649EB0558
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview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
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):418
                                                              Entropy (8bit):4.6190663646477175
                                                              Encrypted:false
                                                              SSDEEP:12:u114MOHT3MUxK9P8pl/3A1nP6uzRS2SqT:u0Pz3Lk9olfOloC
                                                              MD5:050C9A234AB7B30322C3EFFE05E023FE
                                                              SHA1:57E9C9878F84EDBC84DDA6BBA597449682045E3F
                                                              SHA-256:F44BE9C8ED64349D20B20078D75F0B3EAB694C3D461A6A8D9E9A4A2D69B7F4D7
                                                              SHA-512:342C6957AAD2DD2DF6A0ABEAFAB9172507424958A380FCC9653885D250E34EAFAFD97B7369AFD99F4536FE32B1CF173F87871B0B8178FCA17CB27D6E8796F806
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:[NONALPHABETICALLY SPATIER]..Thoracaorta olina udmntningsprofilerne seely rwy ecuadorianeres mexicanize foredate plumaged......untriabness jagerfly omplaceret good litteratursgningsprocessers,salmagundi forgrundsfigurers medbestemmelsesrets endoskeletal fascinates trvesmulds residencia flestes unshrine ciano rundturerne..;darts pentacetate overstudiousness avledygtigheds,disbursals dynamitbombes coquelicot herres..
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):475
                                                              Entropy (8bit):4.3542790265833675
                                                              Encrypted:false
                                                              SSDEEP:12:t+AKS2bg+3+/Ll3mRoOqd+IAm4YCOCu/JvdXfVEuTBt:t+AiM+3+/+oORLnybXNjt
                                                              MD5:1D33156EB1A1B99FB42DCFAAD5F8507B
                                                              SHA1:BC3E09CC2EED6BB0E6CC18734DBD56741A69E898
                                                              SHA-256:C17B44134663E4FD3E807D38EFD54AD9363529C998BDD1808972B877D9868740
                                                              SHA-512:A0D564FE70EC3107A9B97D95D941D1715D3B9400A98F7B25802912FD6C9DDC0E726AEBD7448D2ACF092458C2D27B95E3B4D07853CF64CE78EC21DD817A765D03
                                                              Malicious:false
                                                              Preview:..[pratincolous screenwise]..holohedric mesterkok pseudocentric passagian henkogning.Crab bidragsresolutioners wogs depolarising conversionism..Pancreatogenous dagsregnen neuronophagia nonheroical stadsbibliotekarernes..fjenderne biosensor thrive grimaldi supersubtilizeds vange fundamentalisternes nonhectically elefantordnerne rudish.Kultivatorers proprietresses ballver adjustability concertizers ejendomsadministrations churchish eolipiles elvene restocks gruppedynamik..
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:OpenPGP Secret Key
                                                              Category:dropped
                                                              Size (bytes):3668281
                                                              Entropy (8bit):0.1586482976623458
                                                              Encrypted:false
                                                              SSDEEP:24576:paHSA30j7GUTTN1qfdIyGXJayR6KfVBbsMJAL5YvXYRvc6am967q2Ha5v6pHlrER:8
                                                              MD5:5B59BC89F150197449CC6BA8EDFB5BE2
                                                              SHA1:14F50AD3A09D0382F786DA023DC041B41CEB9DEA
                                                              SHA-256:7B102E5DF1828D5A268943C19947A74C085FFE85CD9A3CC4DA915794506C5772
                                                              SHA-512:0372B74E4B3542A784ED8B274584F2FE6203D4F5B36896438F6405D14789BBDDFD6104C27877B9885F6A42D0E6628AC45AB6689304CD93AB4DF809299D27E486
                                                              Malicious:false
                                                              Preview:.................................................................................................................................................................................................................................................................................................................................C........................................................................................................................................................................................................................................................................................................................................................................................................................W..........................................................................................~.......................t.................................................................................................7......................................................
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):6483488
                                                              Entropy (8bit):0.15918176319715002
                                                              Encrypted:false
                                                              SSDEEP:12288:yd3Q3QCvvJpDXwJqKikWvCQs2wmmZqdOZukbo2PKnO4dxpDzJ9JBtJ1u/08N4IvL:+
                                                              MD5:88649EB8E8169913A0384E0BF6C57097
                                                              SHA1:0C9510E755AD46A2EC51511D6057A54ADE9FB876
                                                              SHA-256:79940BE88674AB93E8B4571D07FF6961A7C3186C5A264156F8E3EE43074A03FC
                                                              SHA-512:53E1161ABDC7B16CBCD78D6F3222F7B3DF97273847AC28415CE851D30443FD3C5683D338F469BA2808B9D15A0A6C4092473B83AECF4FE5DCD90500E5B3424938
                                                              Malicious:false
                                                              Preview:KKKKKKKKKKKKKKKKKKKKKKKKKKVKKKKKKKKUKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK#KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKxKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK.KKKKKKKK
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 101x675, components 3
                                                              Category:dropped
                                                              Size (bytes):5105
                                                              Entropy (8bit):7.707469411628028
                                                              Encrypted:false
                                                              SSDEEP:96:Rh2EA0orehnK1NOHhv2qMgU0NbA9I2l26s7v7aqIJuE5X6E:L2h0QyyOHcEU0N0lds7v7aqIJFl6E
                                                              MD5:9D1B62DD46FDA6AD61CCB778EF066AAA
                                                              SHA1:BCC9D2C609F6C21373F19D0352B66940F501FDF7
                                                              SHA-256:04BBB2A1F5AA03C71FDF84159661069150AE1A748687DE2E1A079AF3FA46C2E9
                                                              SHA-512:E1C76B9FA9A947ADCC25F20EBA39E74447487357EE724B29CBF58F61DE9FFC46637B6ED8627C2427DD5961F7F01A096FF821701DD0C7637BE3D7D53414FCD020
                                                              Malicious:false
                                                              Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........e.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...O...<W.|..)..p..B.Z.(.%.J(...)h...Z(.(....E8R.p....).S.K)...AN..B..R...QK@....(...Z)\,Q..H).f(p..H)..--...AJ(....-..%..\QE..R.@.".).<V...<R.p.R.N...E ...ZE ...C.)qE!.(..P.!N....h`....J).....N..I.-....E-...(...QKE!..8R.N.....H).I.)h..%..Q.)........-.P0...P.!N...+C...8R.p..B.AN.).-.R.).-.P0..(.QKE.).p...Z..QN...*M.....RR.Z(.....ZC...QE.(....B.).S.j.t(.R.p.- ..JZE$...
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):3546314
                                                              Entropy (8bit):0.15902781497317262
                                                              Encrypted:false
                                                              SSDEEP:3072:DU6ggwMAubnOrQTAzAU0YUfpUsQ0iqiHKGeWPKlEk7fO7Xye1AQK3AIfXnxqCp/D:U4
                                                              MD5:F94EBBF3A7C671FC942B917794CBEF99
                                                              SHA1:3B758A6369077F26BE0F6CD9D4850BEF7B1D9360
                                                              SHA-256:D99A359F39C97D7B0CC4D1BF25DB5D408102DD9C8620798AE7D13A203CF5E9DC
                                                              SHA-512:34E66715AA81F5DFE93638BB82B4867F3A7FC95B7C3906789E17DEC4389FFF56B867207246A5F1E42FE895D734FE7932A8B6629C3448465AAFC8E9870F807E40
                                                              Malicious:false
                                                              Preview:oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo.oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo.oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo.oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo~oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):353647
                                                              Entropy (8bit):0.15907710403027892
                                                              Encrypted:false
                                                              SSDEEP:768:4yIQ3t0qOqAIuSwA+ulme7ikqfZBNlmMGJT:4yndASyjfFmMGJT
                                                              MD5:2C97E07B2BE199BF59EBC17FB69E93F9
                                                              SHA1:9842B8BFB262F98BE3040F3DFD668D98EDD4B705
                                                              SHA-256:985B6B12A0B902F3EB7A050B2A6D300C286760DF2C6B0BFDABD58BC4814E691E
                                                              SHA-512:FD157D798D3CFFF1997950467C936D3F0252619549CD35C05369ECFFB6AA586A5DB994C26FB108FE582BACB8335537F3117B55431D49A4F91965E6561BA0B599
                                                              Malicious:false
                                                              Preview:((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((D((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((.((((((((((((((((((((((((((((((.((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((.((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((i((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((.(((((((((((((((((((((((((.((((((((((((((((((((.((((((((((((.((((((((((((((((((((((((((((((((((((((((((((
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):444
                                                              Entropy (8bit):4.525295088742093
                                                              Encrypted:false
                                                              SSDEEP:6:73KgcLQdvIPtvg6FV0pRQAdAlBGZMbG/rNp8ct3zLXAkLkLn+ZGMXQBBvn:7xqhtvruRQAKlgZMb0Jp8AAKs+ZGMAb
                                                              MD5:9607A2F26574486A7800BF4604216BA4
                                                              SHA1:660407EE407DE38306C2B87A08836484FEF365A0
                                                              SHA-256:D2D0B4E5D2B15B838AB70CB57F619B6DFF45693C1D0BA85AB3EF424F9137F263
                                                              SHA-512:806C04FBD565E0D825D45321963474327DEE514346C720728B1AFD0C496466FE5EF41F85B05A0D7BED2BDD6B86D35D6979B1D12E27DE4EF800BEFDE50EBB84BE
                                                              Malicious:false
                                                              Preview:triseme caryocaraceae salgstidspunkternes sadelpladsernes sorglseste vocaliser metrically hamsternes udslukkede pneumoencephalogram,udnyttendes fordrej b septotomy underprospect ordiner hexagyn harst featlier bygningstekniske fremsagde..troskabseds praepostor salvelsesfulde teloteropathic.Guaranteing merchandisable vanes jdekagernes....;lodovico opslidningen devota.Acalephes pyrophyllte presatisfactory tilhngeres adrue....[GLIOSA FLOTSAM]..
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):559
                                                              Entropy (8bit):4.296102616189727
                                                              Encrypted:false
                                                              SSDEEP:12:bXtqNUBZnHnk/6QXWygj1S4j2d9CE1IfxlrV7wm1n4IF39CO3:RqCgRu1L2xIfPVwml39C8
                                                              MD5:A50C62B18088D107A85C8702BE38A5AC
                                                              SHA1:17B0A71D87A1DF657749095527DFFC4DD549F793
                                                              SHA-256:A57AF19FF1A065F7B813EE1C8D356EF3C199E3A1F49BB045BDD8391C6E3F185D
                                                              SHA-512:6935DD9D8F8FBE121A7E675A2D82C36B7369B2E661AE04866D8A916EE7B907FB04200C0D68F7F93863CF2AB77125F1C93FFB6CBA38D9344D9BA9EAFFA0E1596B
                                                              Malicious:false
                                                              Preview:leeftail hypnotics asymmetron servicepriser rumfrger,scrivaille supervictoriousness policemanism fllesnvnerens undertrained inverses rb indhegnede betegnende likeness chounce........filstrrelserne unpracticable reflexives tlf,nazistpartiet junk programudfrelses indsttelsernes revnefrdig unrefulgently ligevgtene resdoktoren ulsters acupunctuation........meliponinae graphiola skikkeligere opgrelsen overvaeldende akkusativisk fancical micturated overskrev avocadokoedet,glam rebounded rimation telegrammets castilianer attestations policedom urocentrum......
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):6308819
                                                              Entropy (8bit):0.15925830676764186
                                                              Encrypted:false
                                                              SSDEEP:384:+DzGyAR9UEKIy6duRb8D9y8+uW7uJdrYtTefHy49heYmVlrseXxGVaVPcGuceLNp:kzoRBsuhf/uBhy
                                                              MD5:0EA793EA873153FB0A67ADFD9F9451C1
                                                              SHA1:F2449BB27F6DA973F48F8DBC9E0DBF7F87675F19
                                                              SHA-256:C49049BB1D44B45C17EC4314E5F51BD883519682F80F424DAC4C1DAE4AF2DDF5
                                                              SHA-512:46A1B9741E0D01A209D18F0DF9818C727C0F4814C9643B138A354AADAE7F3E0AB70EEB600C7045243312B583DE230F550500106026861A1EE25EAE356E674B99
                                                              Malicious:false
                                                              Preview:??????????????????????????.????????????????????????????????????????????????????????????????????????????????????????????????????????????.?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????:????????????????????????????????????????????.??????????????.???????????????????9????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):11264
                                                              Entropy (8bit):5.775131082799803
                                                              Encrypted:false
                                                              SSDEEP:192:eA2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsEf:mS62Gw947ExuGDI7J8EF7KIE
                                                              MD5:B853D5D2361ADE731E33E882707EFC34
                                                              SHA1:C58B1AEABDF1CBB8334EF8797E7ACEAA7A1CB6BE
                                                              SHA-256:F0CD96E0B6E40F92AD1AA0EFACDE833BAE807B92FCA19BF062C1CF8ACF29484B
                                                              SHA-512:8EA31D82FFA6F58DAB5632FE72690D3A6DB0BE65AEC85FC8A1F71626773C0974DCEBEFAE17BCF67C4C56EF442545E985EEA0B348FF6E4FC36740640092B08D69
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              • Antivirus: Virustotal, Detection: 0%, Browse
                                                              Joe Sandbox View:
                                                              • Filename: kvk78zDZTu.exe, Detection: malicious, Browse
                                                              • Filename: kvk78zDZTu.exe, Detection: malicious, Browse
                                                              • Filename: RFQ- PO#0224-HANYOUNG Project REV03 -SUPPLY.com.exe, Detection: malicious, Browse
                                                              • Filename: RFQ- PO#0224-HANYOUNG Project REV03 -SUPPLY.com.exe, Detection: malicious, Browse
                                                              • Filename: KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe, Detection: malicious, Browse
                                                              • Filename: KEO-Order-3AY37A-APRIL_3103734_SUA721302_301824_01AU481924.exe, Detection: malicious, Browse
                                                              • Filename: Lj4maSom2B.exe, Detection: malicious, Browse
                                                              • Filename: Lj4maSom2B.exe, Detection: malicious, Browse
                                                              • Filename: HW#210872-218YAT-THEON-GLOBAL-Y801823-1AHEY361-APL38102823-19011.exe, Detection: malicious, Browse
                                                              • Filename: HW#210872-218YAT-THEON-GLOBAL-Y801823-1AHEY361-APL38102823-19011.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...q..Q...........!................9'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..@....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\rJustificante67.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):21068347
                                                              Entropy (8bit):2.4627673404814754
                                                              Encrypted:false
                                                              SSDEEP:24576:P395pNfzkxQO3ZjhaHSA30j7GUTTN1qfdIyGXJayR6KfVBbsMJAL5YvXYRvc6amL:P3TfzLO6l
                                                              MD5:3F60B5D09D9B20525F7D2FA98B9BDCD5
                                                              SHA1:DBEF30C223C8D87AC8CB484A86AEFA5FE8EEAEEB
                                                              SHA-256:8254B3C0784AD657D4D19FBF20265BF2C1C505B3789B45078F6C02CD4DCE9202
                                                              SHA-512:C50CFFF349E8CCDED8E2395FB2C1C94A7296BD4381C82068CEADBB1D8DA009A8A4ADDA5F008BBB080D858DE4E7475E51FBCD3FEE7EF1CEEE62A579765CD8F10B
                                                              Malicious:false
                                                              Preview:d\......,...................A....4.......[......4\..........................................................................................................................................................................................................................................G...y...........<...j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:MS Windows registry file, NT/2000 or above
                                                              Category:dropped
                                                              Size (bytes):1835008
                                                              Entropy (8bit):4.468795037346412
                                                              Encrypted:false
                                                              SSDEEP:6144:HzZfpi6ceLPx9skLmb0fSZWSP3aJG8nAgeiJRMMhA2zX4WABluuNGjDH5S:TZHtSZWOKnMM6bFpYj4
                                                              MD5:32DCF40DF28975A4E611432AF6FF8192
                                                              SHA1:6357E2CFC2D3B81CE78C707851684ECE1B20F654
                                                              SHA-256:9F2F8BDB11F855B208F3340DFD1CE63491F128C40972FD6501FDA84CE4270156
                                                              SHA-512:9777380C6F55A575E22EE9A68E41DE6ED2DD33974A0978FD50E7FD264AC8ED463C9BEA88E2CAB80DC5871473B5C6468C117A4881ABC6CEF48D5BB37D4FBE78ED
                                                              Malicious:false
                                                              Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:....................................................................................................................................................................................................................................................................................................................................................G..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Entropy (8bit):7.908398248261527
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:rJustificante67.exe
                                                              File size:1'025'520 bytes
                                                              MD5:96bc48e7cc38d731e7e2c25f3f80a88e
                                                              SHA1:bd30afd2f438928b3cb98d9f74766f1e401db091
                                                              SHA256:79714172680d9fd5b1d49fc518abe9cef9200194a04b6611466beccb28c31728
                                                              SHA512:7d71064359f17cae6128db87fdc9a743368b441310d5118734e0ba2a44f5673aeb0f93ea129faa51c6f61f36f135a38f2d90dc550708e87bec67131e4011f908
                                                              SSDEEP:24576:IGLEfEEQyQpBGB59WIMJfEKwqQnc9V4+QA3plULISW1D:1+3isWppTBEk3AAD
                                                              TLSH:C3252392E3E19A6BFE4347B99532D6755A93FE21045180472FECFE3A793330A9447B02
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L......Q.................`...*.......3.......p....@
                                                              Icon Hash:bac6b2aeaaaeb6b2
                                                              Entrypoint:0x40331c
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x51E3058B [Sun Jul 14 20:09:47 2013 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:17b7d61bda0f7478e36d9ce3d4170680
                                                              Signature Valid:false
                                                              Signature Issuer:CN=Bevismateriales, E=Lingvistikkens@Carbolxylol.Vau, O=Bevismateriales, L=Llansamlet, OU="Tegnvise servicekontrakter ", S=Wales, C=GB
                                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                              Error Number:-2146762487
                                                              Not Before, Not After
                                                              • 10/03/2024 08:28:48 10/03/2025 08:28:48
                                                              Subject Chain
                                                              • CN=Bevismateriales, E=Lingvistikkens@Carbolxylol.Vau, O=Bevismateriales, L=Llansamlet, OU="Tegnvise servicekontrakter ", S=Wales, C=GB
                                                              Version:3
                                                              Thumbprint MD5:0FC9B0A6AEAA7BB702353854F53B5C48
                                                              Thumbprint SHA-1:BDF672A357CC8F08CEE9911C1A7E1915C0A6D32A
                                                              Thumbprint SHA-256:BC4DD2CD08BFCA1FB61E76017CCAF4F20BDEE8F90DD39181E7DFED752E095BB6
                                                              Serial:35E1914ECD93556C28ACB1E7F4742F1A75FB97D3
                                                              Instruction
                                                              sub esp, 000002D4h
                                                              push ebx
                                                              push ebp
                                                              push esi
                                                              push edi
                                                              push 00000020h
                                                              xor ebp, ebp
                                                              pop esi
                                                              mov dword ptr [esp+14h], ebp
                                                              mov dword ptr [esp+10h], 00409230h
                                                              mov dword ptr [esp+1Ch], ebp
                                                              call dword ptr [00407034h]
                                                              push 00008001h
                                                              call dword ptr [004070BCh]
                                                              push ebp
                                                              call dword ptr [004072ACh]
                                                              push 00000008h
                                                              mov dword ptr [00429298h], eax
                                                              call 00007FD7592EC892h
                                                              mov dword ptr [004291E4h], eax
                                                              push ebp
                                                              lea eax, dword ptr [esp+34h]
                                                              push 000002B4h
                                                              push eax
                                                              push ebp
                                                              push 00420690h
                                                              call dword ptr [0040717Ch]
                                                              push 0040937Ch
                                                              push 004281E0h
                                                              call 00007FD7592EC4FDh
                                                              call dword ptr [00407134h]
                                                              mov ebx, 00434000h
                                                              push eax
                                                              push ebx
                                                              call 00007FD7592EC4EBh
                                                              push ebp
                                                              call dword ptr [0040710Ch]
                                                              cmp word ptr [00434000h], 0022h
                                                              mov dword ptr [004291E0h], eax
                                                              mov eax, ebx
                                                              jne 00007FD7592E99EAh
                                                              push 00000022h
                                                              mov eax, 00434002h
                                                              pop esi
                                                              push esi
                                                              push eax
                                                              call 00007FD7592EBF59h
                                                              push eax
                                                              call dword ptr [00407240h]
                                                              mov dword ptr [esp+18h], eax
                                                              jmp 00007FD7592E9AAEh
                                                              push 00000020h
                                                              pop edx
                                                              cmp cx, dx
                                                              jne 00007FD7592E99E9h
                                                              inc eax
                                                              inc eax
                                                              cmp word ptr [eax], dx
                                                              je 00007FD7592E99DBh
                                                              add word ptr [eax], 0000h
                                                              Programming Language:
                                                              • [EXP] VC++ 6.0 SP5 build 8804
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x720000xd698.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xf97400xeb0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x5e200x6000dd493ae9ebfb948f2a612edd72200a78False0.6545003255208334data6.407301589030798IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x70000x13540x14008a134e15423272c853e24b49bfc8707fFalse0.43046875data5.037834422880877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0x90000x202d80x600baf389fb3ef48369d3c1f90021fcff8bFalse0.4733072916666667data3.7606720362000137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x2a0000x480000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x720000xd6980xd8009bac6fbf076b462d9856d662ef171efbFalse0.19165943287037038data3.6185917239970986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x722680x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.1762402774858104
                                                              RT_ICON0x7b7100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.17064315352697096
                                                              RT_ICON0x7dcb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.20684803001876173
                                                              RT_DIALOG0x7ed600x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0x7ee600xf8dataEnglishUnited States0.6330645161290323
                                                              RT_DIALOG0x7ef580xa0dataEnglishUnited States0.6125
                                                              RT_DIALOG0x7eff80x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0x7f0580x30dataEnglishUnited States0.8333333333333334
                                                              RT_VERSION0x7f0880x220dataEnglishUnited States0.5459558823529411
                                                              RT_MANIFEST0x7f2a80x3eaXML 1.0 document, ASCII text, with very long lines (1002), with no line terminatorsEnglishUnited States0.5179640718562875
                                                              DLLImport
                                                              KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, MultiByteToWideChar, FindClose, MulDiv, ReadFile, WriteFile, lstrlenA, WideCharToMultiByte
                                                              USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                              ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                              ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                              DescriptionData
                                                              Commentsesdragol
                                                              CompanyNameheliographer tomotorersflys
                                                              FileDescriptiondrfyldings
                                                              LegalCopyrightforraa dalsnknings
                                                              ProductVersion2.5.0.0
                                                              Translation0x0409 0x04e4
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2025-02-17T23:02:12.643085+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649969142.250.185.78443TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Feb 17, 2025 23:02:11.141268015 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:11.141328096 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:11.141407013 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:11.181569099 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:11.181605101 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:11.829004049 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:11.829101086 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:11.830086946 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:11.830136061 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.333264112 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.333344936 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.333761930 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.333828926 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.340908051 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.383338928 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.643132925 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.643215895 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.643244028 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.643261909 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.643287897 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.643342018 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.643580914 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.643604040 CET44349969142.250.185.78192.168.2.6
                                                              Feb 17, 2025 23:02:12.643624067 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.643649101 CET49969443192.168.2.6142.250.185.78
                                                              Feb 17, 2025 23:02:12.670177937 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:12.670195103 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:12.670253992 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:12.670577049 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:12.670595884 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:13.315561056 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:13.315640926 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:13.321002007 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:13.321007967 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:13.321266890 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:13.321331024 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:13.328380108 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:13.375334024 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:15.918148994 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:15.918281078 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:15.918324947 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:15.918384075 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:15.932833910 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:15.932950974 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:15.933016062 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:15.933084011 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.004417896 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.004606009 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.004626989 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.004657984 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.004684925 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.004729033 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.006906986 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.006998062 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.007016897 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.007086992 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.013286114 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.013375044 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.013389111 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.013453007 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.019591093 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.019659042 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.019671917 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.019726992 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.025815010 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.025867939 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.025882006 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.025934935 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.032150984 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.032207012 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.032222986 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.032274961 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.037851095 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.037904978 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.037923098 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.037983894 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.044219017 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.044290066 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.044305086 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.044364929 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.049309015 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.049393892 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.049407005 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.049463987 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.054919004 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.054981947 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.055016994 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.055075884 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.069958925 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.070051908 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.070086956 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.070151091 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.070174932 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.070225954 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.091000080 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.091058969 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.091074944 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.091135025 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.091146946 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.091197014 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.091208935 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.091255903 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.091454983 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.091502905 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.093210936 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.093262911 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.093616962 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.093669891 CET49976443192.168.2.6216.58.212.129
                                                              Feb 17, 2025 23:02:16.098891973 CET44349976216.58.212.129192.168.2.6
                                                              Feb 17, 2025 23:02:16.098952055 CET49976443192.168.2.6216.58.212.1