Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
Analysis ID:1617649
MD5:b5563d46fab00984999c0ecb16bd0256
SHA1:2c69a0ba54e3df3543bedfa9ec6cacfe7b5e2404
SHA256:c6f441e5281b224ea5f28a25609475965c677663c648d4732cc34ecee8459830
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://inhanoi.net.vn", "Username": "newboxoffice@inhanoi.net.vn", "Password": "^TSt3!FK$UBA"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4253028764.0000000032D1C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.4253028764.0000000032CF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.4253028764.0000000032CF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1980240094.0000000005478000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe PID: 396JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T06:27:41.774077+010028032702Potentially Bad Traffic192.168.2.449738172.217.18.14443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe.3244.4.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://inhanoi.net.vn", "Username": "newboxoffice@inhanoi.net.vn", "Password": "^TSt3!FK$UBA"}
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeVirustotal: Detection: 23%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.217.18.14:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00405FFD FindFirstFileA,FindClose,0_2_00405FFD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_00405FFD FindFirstFileA,FindClose,4_2_00405FFD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_00402688 FindFirstFileA,4_2_00402688
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_0040559B
            Source: global trafficTCP traffic: 192.168.2.4:54917 -> 162.159.36.2:53
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 45.252.248.26 45.252.248.26
            Source: Joe Sandbox ViewASN Name: AZDIGI-AS-VNAZDIGICorporationVN AZDIGI-AS-VNAZDIGICorporationVN
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49738 -> 172.217.18.14:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: inhanoi.net.vn
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4253028764.0000000032D1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://inhanoi.net.vn
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4253028764.0000000032CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4253028764.0000000032CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4253028764.0000000032CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4253028764.0000000032CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.0000000002488000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.00000000024C1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4252513480.0000000031D70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.00000000024C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73#
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100602228.0000000002511000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2115788681.000000000250E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100553261.000000000250E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/12
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100602228.0000000002511000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2115788681.000000000250E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100553261.000000000250E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/d
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.00000000024F2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100602228.0000000002511000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2115788681.00000000024F2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100553261.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73&export=download
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100602228.0000000002511000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100553261.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73&export=downloadd0
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100602228.0000000002511000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2100553261.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1F5xciwj-aCR3PTy0qxCEs8BDk3CdEw73&export=downloade
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064744500.0000000002514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2064863701.0000000002514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 172.217.18.14:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00405050 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405050
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004030D9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_004063440_2_00406344
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_0040488F0_2_0040488F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_004063444_2_00406344
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0040488F4_2_0040488F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_02424A584_2_02424A58
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0242DAA84_2_0242DAA8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0242ABF94_2_0242ABF9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0242A9E04_2_0242A9E0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_02423E404_2_02423E40
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_024241884_2_02424188
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_3546F7C44_2_3546F7C4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_3546B2904_2_3546B290
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35469C484_2_35469C48
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BCB6E84_2_35BCB6E8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BC7E284_2_35BC7E28
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BC56504_2_35BC5650
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BC31104_2_35BC3110
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BCB2C74_2_35BCB2C7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BCC2184_2_35BCC218
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BC84704_2_35BC8470
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_35BC77484_2_35BC7748
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: String function: 00402A3A appears 52 times
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000000.00000002.1972247975.0000000000436000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4252717476.0000000032A09000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2115788681.000000000250E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4233413828.0000000000436000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.000000000250E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeBinary or memory string: OriginalFilenameundfangelsen resurceanvendelser.exeDVarFileInfo$ vs SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/25@4/4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_004030D9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004030D9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_0040431C GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040431C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_0040205E CoCreateInstance,MultiByteToWideChar,0_2_0040205E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile created: C:\Users\user\Slutafregningers175Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeMutant created: NULL
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile created: C:\Users\user\AppData\Local\Temp\nssCA9A.tmpJump to behavior
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeVirustotal: Detection: 23%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile written: C:\Users\user\Slutafregningers175\ammunitionsfabrikkers\Lindelysthusets\Picklesenes\bovnende.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe PID: 396, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.1980240094.0000000005478000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile created: C:\Users\user\AppData\Local\Temp\nsdD73F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeAPI/Special instruction interceptor: Address: 58B48C8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeAPI/Special instruction interceptor: Address: 1C248C8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeRDTSC instruction interceptor: First address: 585C9DB second address: 585C9DB instructions: 0x00000000 rdtsc 0x00000002 cmp edx, 74374FBFh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007FB91CC15F0Ch 0x0000000c cmp ax, bx 0x0000000f cmp bx, dx 0x00000012 inc ebp 0x00000013 test eax, edx 0x00000015 inc ebx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeRDTSC instruction interceptor: First address: 1BCC9DB second address: 1BCC9DB instructions: 0x00000000 rdtsc 0x00000002 cmp edx, 74374FBFh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007FB91CE56FBCh 0x0000000c cmp ax, bx 0x0000000f cmp bx, dx 0x00000012 inc ebp 0x00000013 test eax, edx 0x00000015 inc ebx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeMemory allocated: 23E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeMemory allocated: 32CA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeMemory allocated: 32A10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598353Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596607Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596500Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596279Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594748Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594640Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWindow / User API: threadDelayed 8922Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWindow / User API: threadDelayed 939Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsdD73F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeAPI coverage: 1.4 %
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep count: 31 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -28592453314249787s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 1344Thread sleep count: 8922 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 1344Thread sleep count: 939 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598353s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -597046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596607s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596279s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595296s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595187s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -594968s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -594748s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe TID: 6548Thread sleep time: -594640s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00405FFD FindFirstFileA,FindClose,0_2_00405FFD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_00405FFD FindFirstFileA,FindClose,4_2_00405FFD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_00402688 FindFirstFileA,4_2_00402688
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 4_2_0040559B GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_0040559B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598353Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596607Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596500Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596279Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594748Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeThread delayed: delay time: 594640Jump to behavior
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000000.00000002.1974204572.0000000000698000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.00000000024C1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.00000000024F8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000003.2115788681.00000000024FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe, 00000004.00000002.4234694035.0000000002488000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh7M
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeAPI call chain: ExitProcess graph end nodegraph_0-4746
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeAPI call chain: ExitProcess graph end nodegraph_0-4749
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeCode function: 0_2_00405D1B GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D1B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.4253028764.0000000032D1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4253028764.0000000032CF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe PID: 3244, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000004.00000002.4253028764.0000000032CF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe PID: 3244, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.4253028764.0000000032D1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4253028764.0000000032CF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.Evo-gen.5457.19170.exe PID: 3244, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            226
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager311
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.