Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.generic.ml.10062.exe

Overview

General Information

Sample Name:SecuriteInfo.com.generic.ml.10062.exe
Analysis ID:634320
MD5:95050a1e0c7d4c57f62e26967b3b0bfd
SHA1:baa57d1bf6d8a41ba89c6d09bfc4ec2bc986830c
SHA256:458597ef6835136826411179f244673d5b2702e906bedb3e470786eb455d98ce
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • SecuriteInfo.com.generic.ml.10062.exe (PID: 7996 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe" MD5: 95050A1E0C7D4C57F62E26967B3B0BFD)
    • CasPol.exe (PID: 3968 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 984 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 4028 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 1264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "SMTP", "SMTP Info": "droidyandex@centraldefiltros.clicui4cu2@@mail.centraldefiltros.cldroidyandexreports@centraldefiltros.cl"}
{"Payload URL": "http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.62482366099.00000000032B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
        • 0x3116c:$s10: logins
        • 0x4aff4:$s11: credential
        • 0x1e1e:$m1: yyyy-MM-dd hh-mm-ssCookieapplication/zipSCSC_.jpegScreenshotimage/jpeg/log.tmpKLKL_.html<html></html>Logtext/html[]Time
        • 0x28b7:$m3: >{CTRL}</font>Windows RDPcredentialpolicyblobrdgchrome{{{0}}}CopyToComputeHashsha512CopySystemDrive\WScript.ShellRegReadg401
        • 0x1f3f:$m5: \WindowsLoad%ftphost%/%ftpuser%%ftppassword%STORLengthWriteCloseGetBytesOpera
        00000005.00000000.62332198808.0000000000F00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          Timestamp:192.168.11.202.56.57.2249763802018752 05/25/22-22:44:01.684322
          SID:2018752
          Source Port:49763
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000001.00000002.62482366099.00000000032B0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin"}
          Source: SecuriteInfo.com.generic.ml.10062.exe.7996.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "droidyandex@centraldefiltros.clicui4cu2@@mail.centraldefiltros.cldroidyandexreports@centraldefiltros.cl"}
          Source: SecuriteInfo.com.generic.ml.10062.exeVirustotal: Detection: 11%Perma Link
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.dr
          Source: Binary string: System.IO.FileSystem.Watcher.ni.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.dr
          Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.dr
          Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.dr
          Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.Watcher\net6.0-windows-Release\System.IO.FileSystem.Watcher.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.dr
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_0040290B FindFirstFileW,

          Networking

          barindex
          Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49763 -> 2.56.57.22:80
          Source: Malware configuration extractorURLs: http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin
          Source: Joe Sandbox ViewASN Name: GBTCLOUDUS GBTCLOUDUS
          Source: global trafficHTTP traffic detected: GET /yendexoriginwithoutfilter_rtSDhNF87.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 2.56.57.22Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: unknownTCP traffic detected without corresponding DNS query: 2.56.57.22
          Source: CasPol.exe, 00000005.00000002.67212907111.000000001D58F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"C
          Source: CasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
          Source: CasPol.exe, 00000005.00000003.63392768852.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67188771993.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin
          Source: CasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
          Source: folder-publicshare.png.1.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
          Source: CasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mglNPC.com
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://ocsp.digicert.com0N
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://ocsp.digicert.com0O
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://ocsp.thawte.com0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://s2.symcb.com0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com01
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com02
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com05
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://sv.symcb.com/sv.crt0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://sv.symcd.com0&
          Source: avutil-54.dll.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drString found in binary or memory: http://www.avast.com0/
          Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://www.certum.pl/CPS0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: http://www.digicert.com/CPS0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://www.nero.com
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://www.symauth.com/cps0(
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: http://www.symauth.com/rpa00
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: https://d.symcb.com/cps0%
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drString found in binary or memory: https://d.symcb.com/rpa0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.drString found in binary or memory: https://github.com/dotnet/runtime
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.dr, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: https://www.digicert.com/CPS0
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.drString found in binary or memory: https://www.globalsign.com/repository/0
          Source: CasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
          Source: global trafficHTTP traffic detected: GET /yendexoriginwithoutfilter_rtSDhNF87.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 2.56.57.22Cache-Control: no-cache
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

          System Summary

          barindex
          Source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Process Memory Space: CasPol.exe PID: 4028, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: Process Memory Space: CasPol.exe PID: 4028, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00406D5F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_6F671BFF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C1E19
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C09E6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA722
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1727
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0338
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0734
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0B0C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1B19
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B176C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0379
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B077D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0B4A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1755
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B03A9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B17A3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7BA6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA7A6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C17BF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7BB3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0B89
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA78F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B438E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B17E5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA7FE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0BC1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B07C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B03DE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0225
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0609
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B6A05
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7E1A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0A66
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0648
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA642
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0E40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0A45
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0255
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C2AAC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA6B9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B06BC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B02B3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C46B0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0683
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0E82
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0281
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0687
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0A9E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1AEA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C22E4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B02FE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B06F6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0ADD
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BB12B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7139
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA538
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C2539
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0930
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0D34
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0505
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1917
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B056B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B016F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA567
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B6D72
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0976
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BB148
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1943
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0DAD
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B19B9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B01B0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B09B7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7D8C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1980
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0586
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA59E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B01E4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B09FA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B69FF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0DF6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1DCC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B05D2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B040E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B000E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0802
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0C68
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0C6E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0C64
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7C48
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B044F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0C42
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0840
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B005B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B185C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0CA9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0887
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0485
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B189B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0095
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B7CE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B6CEC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA4F9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B0CF4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B18CE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B00CE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B08C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B04C6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B6CDF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013478D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01347E56
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134D680
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01345128
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01343179
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013425E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134D058
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01346310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01345B80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134EA70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A8430
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A5888
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A7B06
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A9F70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013ADF60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A93D9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A07D2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A5E08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013AAA60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A9AB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A4540
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_013A4190
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C6214E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C62D518
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C6272D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D325D08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D324374
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D325C20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D3269D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F714320
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F71BE70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F71B110
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F71DC78
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F718C68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F713708
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1F713A50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C1E19 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C41B7 NtResumeThread,
          Source: System.IO.FileSystem.Watcher.dll.1.drStatic PE information: No import functions for PE file found
          Source: MsMpLics.dll.1.drStatic PE information: No import functions for PE file found
          Source: lang-1045.dll.1.drStatic PE information: No import functions for PE file found
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameARMOURY CRATE eGPU Product.exe8 vs SecuriteInfo.com.generic.ml.10062.exe
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.generic.ml.10062.exe
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.IO.FileSystem.Watcher.dll@ vs SecuriteInfo.com.generic.ml.10062.exe
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeSection loaded: edgegdi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: invalid certificate
          Source: p11-kit-trust.dll.1.drStatic PE information: Number of sections : 11 > 10
          Source: SecuriteInfo.com.generic.ml.10062.exeVirustotal: Detection: 11%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeJump to behavior
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\nsv213.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/14@0/1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_004021AA CoCreateInstance,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1264:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1264:304:WilStaging_02
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile written: C:\Users\user\AppData\Local\Temp\krista.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic file information: File size 1447056 > 1048576
          Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.dr
          Source: Binary string: System.IO.FileSystem.Watcher.ni.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.dr
          Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.dr
          Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.1.dr
          Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.Watcher\net6.0-windows-Release\System.IO.FileSystem.Watcher.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.dr

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000001.00000002.62482366099.00000000032B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.62332198808.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_6F6730C0 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BC74F push 3A3A3F63h; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B8E23 pushad ; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B5AC9 push FFFFFF86h; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B9AD4 push esp; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BC9C2 push ebp; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134142F push edi; retn 0000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC2A pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC06 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC56 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC96 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC9E pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC83 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CC8E pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCE6 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCE2 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCEE pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCEA pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCDE pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCDA pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CCCF pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB26 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB16 push ss; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB12 push ss; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB1A pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB6E pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CB46 push ss; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CBB2 pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CBBE pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CBAE push ss; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134CBAA push ss; ret
          Source: p11-kit-trust.dll.1.drStatic PE information: section name: .xdata
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_6F671BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: MsMpLics.dll.1.drStatic PE information: 0xE6DA2BE7 [Wed Sep 24 01:22:47 2092 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 6.94282730477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\nsi821.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\avutil-54.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\lang-1045.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\p11-kit-trust.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\MsMpLics.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exeJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62482616857.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62482616857.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 4232Thread sleep time: -2767011611056431s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\avutil-54.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lang-1045.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\p11-kit-trust.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MsMpLics.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exeJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1F29 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9940
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_0040290B FindFirstFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeSystem information queried: ModuleInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeAPI call chain: ExitProcess graph end node
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62482616857.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: avutil-54.dll.1.drBinary or memory string: yuv420pyuyv422rgb24bgr24yuv422pyuv444pyuv410pyuv411pgraygray8,y8monowmonobpal8yuvj420pyuvj422pyuvj444pxvmcmcxvmcidctuyvy422uyyvyy411bgr8bgr4bgr4_bytergb8rgb4rgb4_bytenv12nv21argbrgbaabgrbgragray16bey16begray16ley16leyuv440pyuvj440pyuva420pvdpau_h264vdpau_mpeg1vdpau_mpeg2vdpau_wmv3vdpau_vc1rgb48bergb48lergb565bergb565lergb555bergb555lebgr565bebgr565lebgr555bebgr555levaapi_mocovaapi_idctvaapi_vldyuv420p16leyuv420p16beyuv422p16leyuv422p16beyuv444p16leyuv444p16bevdpau_mpeg4dxva2_vldrgb444lergb444bebgr444lebgr444beya8gray8abgr48bebgr48leyuv420p9beyuv420p9leyuv420p10beyuv420p10leyuv422p10beyuv422p10leyuv444p9beyuv444p9leyuv444p10beyuv444p10leyuv422p9beyuv422p9levda_vldgbrpgbrp9begbrp9legbrp10begbrp10legbrp16begbrp16leyuva420p9beyuva420p9leyuva422p9beyuva422p9leyuva444p9beyuva444p9leyuva420p10beyuva420p10leyuva422p10beyuva422p10leyuva444p10beyuva444p10leyuva420p16beyuva420p16leyuva422p16beyuva422p16leyuva444p16beyuva444p16levdpauxyz12lexyz12benv16nv20lenv20beyvyu422vdaya16beya16leqsvmmald3d11va_vldrgba64bergba64lebgra64bebgra64le0rgbrgb00bgrbgr0yuva444pyuva422pyuv420p12beyuv420p12leyuv420p14beyuv420p14leyuv422p12beyuv422p12leyuv422p14beyuv422p14leyuv444p12beyuv444p12leyuv444p14beyuv444p14legbrp12begbrp12legbrp14begbrp14legbrapgbrap16begbrap16leyuvj411pbayer_bggr8bayer_rggb8bayer_gbrg8bayer_grbg8bayer_bggr16lebayer_bggr16bebayer_rggb16lebayer_rggb16bebayer_gbrg16lebayer_gbrg16bebayer_grbg16lebayer_grbg16beyuv440p10leyuv440p10beyuv440p12leyuv440p12beayuv64leayuv64bevideotoolbox_vldunknowntvpcreservedbt470mbt2020linearlog100log316iec61966-2-4bt1361eiec61966-2-1bt2020-10bt2020-20gbrycgcobt2020ncbt2020cunspecifiedleftcentertoplefttopbottomleftbottomrgb32bgr32le%s%sname nb_components nb_bits%-11s %7d %10dlibavutil/pixdesc.cd->log2_chroma_w <= 3d->log2_chroma_h <= 3d->nb_components <= 4d->name && d->name[0](d->nb_components==4 || d->nb_components==2) == !!(d->flags & (1 << 7))!c->plane && !c->step_minus1 && !c->offset_plus1 && !c->shift && !c->depth_minus1c->step_minus1 >= c->depth_minus18*(c->step_minus1+1) >= c->depth_minus1+1bayer_tmp[0] == 0 && tmp[1] == 0beyuvjpixelutils support is required but libavutil is not compiled with it
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: avutil-54.dll.1.drBinary or memory string: xvmcidct
          Source: CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: CasPol.exe, 00000005.00000003.63392916195.00000000011DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67188286070.000000000117B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67188909794.00000000011DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62482616857.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: CasPol.exe, 00000005.00000003.63392916195.00000000011DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67188909794.00000000011DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%k,
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62483095871.0000000004F19000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: CasPol.exe, 00000005.00000002.67190695311.0000000002D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_6F671BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B1F29 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C121E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032C1954 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032BA4F9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0134F328 LdrInitializeThunk,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: F00000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_032B78D6 cpuid
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4028, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: Yara matchFile source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4028, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4028, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts211
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          2
          Obfuscated Files or Information
          LSASS Memory127
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          Exfiltration Over Bluetooth1
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)111
          Process Injection
          1
          Software Packing
          Security Account Manager331
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          Automated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Timestomp
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          Scheduled Transfer111
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets241
          Virtualization/Sandbox Evasion
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common241
          Virtualization/Sandbox Evasion
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Access Token Manipulation
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
          Process Injection
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 634320 Sample: SecuriteInfo.com.generic.ml... Startdate: 25/05/2022 Architecture: WINDOWS Score: 100 31 Snort IDS alert for network traffic 2->31 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 5 other signatures 2->37 7 SecuriteInfo.com.generic.ml.10062.exe 6 35 2->7         started        process3 file4 21 C:\Users\user\AppData\...\p11-kit-trust.dll, PE32+ 7->21 dropped 23 C:\Users\user\AppData\Local\...\System.dll, PE32 7->23 dropped 25 C:\Users\user\AppData\Local\...\lang-1045.dll, PE32 7->25 dropped 27 4 other files (none is malicious) 7->27 dropped 39 Writes to foreign memory regions 7->39 41 Tries to detect Any.run 7->41 11 CasPol.exe 11 7->11         started        15 CasPol.exe 7->15         started        17 CasPol.exe 7->17         started        signatures5 process6 dnsIp7 29 2.56.57.22, 49763, 80 GBTCLOUDUS Netherlands 11->29 43 Tries to steal Mail credentials (via file / registry access) 11->43 45 Tries to harvest and steal browser information (history, passwords, etc) 11->45 47 Tries to detect Any.run 11->47 19 conhost.exe 11->19         started        49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->51 signatures8 process9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.generic.ml.10062.exe12%VirustotalBrowse
          SecuriteInfo.com.generic.ml.10062.exe7%ReversingLabsWin32.Downloader.GuLoader
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\MsMpLics.dll0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\MsMpLics.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\avutil-54.dll0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\avutil-54.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\lang-1045.dll0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\lang-1045.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsi821.tmp\System.dll3%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\nsi821.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\p11-kit-trust.dll0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://mglNPC.com0%Avira URL Cloudsafe
          http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
          http://DynDns.comDynDNS0%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%VirustotalBrowse
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
          http://subca.ocsp-certum.com050%Avira URL Cloudsafe
          http://ocsp.thawte.com00%Avira URL Cloudsafe
          http://subca.ocsp-certum.com020%Avira URL Cloudsafe
          http://subca.ocsp-certum.com010%Avira URL Cloudsafe
          http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin0%Avira URL Cloudsafe
          http://www.avast.com0/0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bintrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://mglNPC.comCasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://127.0.0.1:HTTP/1.1CasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          low
          http://DynDns.comDynDNSCasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.generic.ml.10062.exefalse
            high
            http://creativecommons.org/licenses/by-sa/4.0/folder-publicshare.png.1.drfalse
              high
              http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.generic.ml.10062.exefalse
                high
                http://crl.thawte.com/ThawteTimestampingCA.crl0SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drfalse
                  high
                  http://repository.certum.pl/ctsca2021.cer0SecuriteInfo.com.generic.ml.10062.exefalse
                    high
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.generic.ml.10062.exefalse
                      high
                      http://subca.ocsp-certum.com05SecuriteInfo.com.generic.ml.10062.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.symauth.com/rpa00SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drfalse
                        high
                        http://ocsp.thawte.com0SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://subca.ocsp-certum.com02SecuriteInfo.com.generic.ml.10062.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.nero.comSecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drfalse
                          high
                          http://subca.ocsp-certum.com01SecuriteInfo.com.generic.ml.10062.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.generic.ml.10062.exefalse
                            high
                            http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.generic.ml.10062.exefalse
                              high
                              http://www.avast.com0/SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.1.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.generic.ml.10062.exefalse
                                high
                                http://www.symauth.com/cps0(SecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62481419345.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.1.drfalse
                                  high
                                  http://www.certum.pl/CPS0SecuriteInfo.com.generic.ml.10062.exefalse
                                    high
                                    https://github.com/dotnet/runtimeSecuriteInfo.com.generic.ml.10062.exe, 00000001.00000002.62478493581.000000000293F000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.1.drfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      2.56.57.22
                                      unknownNetherlands
                                      395800GBTCLOUDUStrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:634320
                                      Start date and time: 25/05/202222:41:382022-05-25 22:41:38 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 13m 28s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:SecuriteInfo.com.generic.ml.10062.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                      Run name:Suspected Instruction Hammering
                                      Number of analysed new started processes analysed:26
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@8/14@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:
                                      • Successful, ratio: 27.8% (good quality ratio 27.4%)
                                      • Quality average: 87.6%
                                      • Quality standard deviation: 21.3%
                                      HCA Information:
                                      • Successful, ratio: 98%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, tile-service.weather.microsoft.com, wdcp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      22:44:13API Interceptor2702x Sleep call for process: CasPol.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):1955040
                                      Entropy (8bit):6.826653374498559
                                      Encrypted:false
                                      SSDEEP:49152:T3VwASOuGtlq2fIU6iFm7+BSGYsFoXOh5PGP1T/eacB4dPFPxat:vw+FDKXkuLPxS
                                      MD5:39981C2A1465413B506246DA3721D9A1
                                      SHA1:213C41C908F9A7C62C4D5D8079FC17188066CB3B
                                      SHA-256:19AE2C74ECE76F6AE7074AC31B198D6BF201DDE201B5B31EACA023877241F7B9
                                      SHA-512:F047681FF16D7C428E39D6A705BDD290B7EA227AC8176E69B989B90297541CD2A596B71673E6DFA0ACB83B201EB815E0518D52169D9FC48C6AEBF78DCB998D7D
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8.}.k.}.k.}.k..Rk.}.k...j.}.k...j.}.k...j.}.k...j.}.k...j.}.k...j.}.k.}.k.|.k.}.k.}.kg..j3|.kf..j.}.kf.>k.}.k.}Vk.}.kf..j.}.kRich.}.k................PE..d....j.`.........."............................@.............................0...........`..................................................c...................................L.....p...........................@................ ...............................text............................... ..`.rdata..*j... ...l..................@..@.data...0e......."...z..............@....pdata..............................@..@.rsrc................b..............@..@.reloc...L.......N...h..............@..B........................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):13978
                                      Entropy (8bit):7.983903298012058
                                      Encrypted:false
                                      SSDEEP:384:g/fHDCOQD/zKzAwhZMiZY79lBpsIyK0Xqv:g/fjdQTzKzBhZMw+lfsIyBW
                                      MD5:6CEA9045463D0C5D27E1A89AE139E33F
                                      SHA1:64A5497F8D154AEEF22F7CAC3F72F4D2FC5F9D62
                                      SHA-256:D532BF8700F1B322DCF738AF6EF2DAB7FE5328DCBA0C4ED04227AF6BA4F1A1BD
                                      SHA-512:B20D641DD59247BE2E75EA0F96408949EFE40864058B3D0938E3DBFA2F8AC960CB2F2E52E62FBE42DEC2C93EF4D9B89CF44BA31E102C3BBB7C3B726EDE77BACA
                                      Malicious:false
                                      Reputation:low
                                      Preview:..8S/or.>;.K4C...Z.r7..0Yk.A.>....X\.{....Q...9.2..J|.0.a.8...h.v.m.?X.f.1....F&..y;..3.1../..eH.L.~...@..Fs6H..b..x....AA.q.+.j.z|.....g.&n...9..B.s.........I......R...m.*1...f?........W... ..~}._..M.r.....}}:.......%.7...7....9.........(.$.|r6...~8..3.p!xM2.....m..9..C..Us.8..+.lp+.e'..x.g.....9....x.?.}.q.\...`........0...M'2..}(|.=.uB..k..}..=:.BG\..?.P.a.!.V....v.....?.>.....zG.....d.D.jP..wD.pM..{h....'T.....>Fy.9.K.Q...af....Fq.\...Pe..G.oR.d...a5.|...FPTT{[".;hz`....(....9..r.[]F.$.A+bdz....'&TeQ.G?..7...f.O{.a!!?...[X?.j+.[9 ....QL}!u...1/:>.:6%.6.A....N....#..1.8P.2Q,.QYxk'.2D............C?..g....Y..z3W...h..5..L.i....m..a.5.$.....z...S...'lB..S.....F.e...>.8.....|.6.*.-srN&.]....s.....Lou:z..h..v.-..9.K....^.G.Qc..G.'.s....=U.-...."..ja..7.Oj..[.k,.ti(.-p.|....8..g...y..`......Q`X.....cT.l.*...6.r..$.....&........1J......R.#..-U..h.B..........L../../{Kk.....f....g%......#..["....lj..P..N...F.".0.'..H:U.JowM./L......Q.3
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                      Category:modified
                                      Size (bytes):966
                                      Entropy (8bit):3.069177920554261
                                      Encrypted:false
                                      SSDEEP:12:8wl0YRsXUCV/tz+7RafgKDq9XKN4mWQ18/rNJkKAh4t2YCBTo8:87raRMgKsK2OS5HALJT
                                      MD5:54BD2D457F7D4C05C7AFE12B2ABCF87B
                                      SHA1:A6FA0107D62F273B2C8AE469FE5450F851819934
                                      SHA-256:87E5DF62B393359F15DE57070A40440C2A84DD4323FA00EC34F66805CCC117C4
                                      SHA-512:09BCA14D3A0C418791FC8911EA542F5AD14EA0C11BE8D2F88111283223AC85F941E961F1372D934E63BC9BFE50277D731A4662FC3C257F9D7B84D3937CCBA22A
                                      Malicious:false
                                      Reputation:low
                                      Preview:L..................F........................................................?....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....x.2...........Unoppignorated.exe..V............................................U.n.o.p.p.i.g.n.o.r.a.t.e.d...e.x.e...".......\.U.n.o.p.p.i.g.n.o.r.a.t.e.d...e.x.e.".C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):20008
                                      Entropy (8bit):6.8686823517057265
                                      Encrypted:false
                                      SSDEEP:384:xWgEHWp1v7S+10QnqiZwtfXbMpBjn0aq8f0DBRJYHClXLRXoS:nEijw8Be1PqspoS
                                      MD5:797476E8813090CC62D574BB9B59F2DD
                                      SHA1:BDBBBFD1B3B2E8B2CCF368815DCF06247FC08C14
                                      SHA-256:85C2314ECAA192D438DEBFAB7490E047C7780EB59A115DFEB68E36BF84CFAC22
                                      SHA-512:42A6AC5750DC4F8D533AD03098348732519AE27C0EE002C4B5953205D5108EAE24C09BFFD587874FCB1DA422152A5B71DD778B58BFA760683C0A565B09C7F936
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<..R...R...R......R..P...R.Rich..R.PE..d....+............" .........................................................0.......c....`.......................................................... ..P...............(<..............8............................................................................rdata..............................@..@.rsrc...P.... ......................@..@.....+..........T...8...8........+..........$...................8....rdata..8...x....rdata$zzzdbg.... ..0....rsrc$01....0!.. ....rsrc$02.... ....n->..;..^.....=1.[.$H.m...+..........................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):85509
                                      Entropy (8bit):6.463912993297197
                                      Encrypted:false
                                      SSDEEP:1536:5qygxpRYb3MSYnrlZw4DLqn2l/G9jIJoHNAU4npu:2XAcSYnpZJ22dG9j6ONAUWu
                                      MD5:B13B974324F63044A880BC84365A0BD0
                                      SHA1:F7DABC096172A0A09C89628D830E067CC97A8E88
                                      SHA-256:A34D0845D289E5A64498E4F6BF5A30A17C3F187FB292CCF5B1057D81D467E63D
                                      SHA-512:B5B841042500D623161916CAD991A4F5561649BA14E609EF79958CAF4D7A95403190C187330330F10A1426F7AB9AFCA2B2ABEF9F1326580E57480D79408A455E
                                      Malicious:false
                                      Preview:....f.e.........7.B8C...................................................<....f.k.f.n.f.b..,..K"....................................................%.PO@.................................!..q.b...f...f.s.3.4...\OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!..r.o...........#.1d^..................................f..........!. .R.............................f...f.....f.c....#|.8;..................................f.t....c..b...k.]^.......................................f....3..Z.....................................................f.v..n......P..............................f.......... p.j&...........................................'r.............................d..r.........5...|...................................................&&/.s.M..f.f.......(.x.o.......................................g.......e....4w....................................................f.d.......0.Cs..........................................(.efQ...........................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):71280
                                      Entropy (8bit):6.498681502225803
                                      Encrypted:false
                                      SSDEEP:1536:OOsuxD2ljgTCcxduILBZIdf7lgzd/I0bWBuMp/xj0:OMxyold9lZI7lOpI0bauH
                                      MD5:BBA87C141D8F08D86033E05DAAC57D5D
                                      SHA1:1EA5B7EE9B5C418FB4B15EE91F7524F5DB0D96D1
                                      SHA-256:EFD311B206AB942C188C3F83AEBE13AEF1D475CB5D822CF3B70AB162DCDC6FF7
                                      SHA-512:20581E2243E5FE63174EAB6A4424C6F3B06D5582984FBF35707C00813FF662F3232C06160A5365B14F1E7FD7D861CA1702B974B3C2D8DA5C3340D6588CA0C82C
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....\............" ......................................................... ......W.....`...@......@............... ..................................L...d(..........p$......p.......T...........................................................P...H............text............................... ..`.data...............................@....reloc..p...........................@..B............................................0.......................<.....4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n.........T.....S.t.r.i.n.g.F.i.l.e.I.n.f.o...0.....0.0.0.0.0.4.b.0.....d...C.o.m.m.e.n.t.s...I.n.t.e.r.n.a.l. .i.m.p.l.e.m.e.n.t.a.t.i.o.n. .p.a.c.k.a.g.e. .n.o.t. .m.e.a.n.t. .f.o.r. .d.i.r.e.c.t. .c.o.n.s.u.m.p.t.i.o.n... .P.l.e.a.s.e. .d.o. .n.o.t. .r.e.f.e.r.e.
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):34
                                      Entropy (8bit):4.256149238118269
                                      Encrypted:false
                                      SSDEEP:3:TFXV4ovxEun:Plv5n
                                      MD5:CEA246A40ED9A68F27EEC9458A18DEEF
                                      SHA1:3E210EBBD8F29926A51BA1074FAD9A22D53659D2
                                      SHA-256:2F37518683B8AA7E7C81B0F07A42B2A2692CA32FE4DEEB6618470A5EB245B2EC
                                      SHA-512:DD12CD2ECC855C0089E641986318FAF183E48798D5EE6F55BADF652186B8177D719FC2E631EF5C6353290827E96ADB59A715E3B82E956908D15012F01A91F9AB
                                      Malicious:false
                                      Preview:[Fortovsretter]..Tagged=SNIPPENS..
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):714072
                                      Entropy (8bit):6.248486521119856
                                      Encrypted:false
                                      SSDEEP:12288:1nBVHwA0eIjodibcTTMIVNQdqu8JbHfySBpHdiChBA:FBVJVNQoL1
                                      MD5:19ED470A232B01BB34B7F85288B017F0
                                      SHA1:4AE08D71FB45055FCCB0D86174150082A39881F1
                                      SHA-256:CF17BEE0C9479D7AAED9D3399E79FD89ED9535175C9AEEA73C54E48124D6C81A
                                      SHA-512:5EBC96C5B13A0D79C0C149C59E30AFC28AECC0FBA543A018551A1F83CEE0111EABAED8400B92694739A3734BDE64F23334BBEAEE28AACBC99358CCA075C82682
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L,/B-B|B-B|B-B|..|G-B|..|k-B|..|.-B|..|.-B|B-C|(-B|.Z.|G-B|B-B|A-B|a.|.-B|$.|C-B|$.|C-B|RichB-B|................PE..L......V.........."!.....J...........o.......`...............................p............@......................... ...=... ..<.......................X3...0..P0..Pk..8...........................x...@............"..P............................text....I.......J.................. ..`.rdata.......`.......N..............@..@.data...@....`.......L..............@....idata....... .......h..............@....reloc...9...0...:...x..............@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PNG image data, 16 x 16, 8-bit colormap, non-interlaced
                                      Category:dropped
                                      Size (bytes):585
                                      Entropy (8bit):6.901794968845596
                                      Encrypted:false
                                      SSDEEP:12:6v/7X0Z7HBwN1+swFIzRqwnN14BZlEcFCF2BoCaTxT4:C0BqEWqQ8YGCgBoCaT14
                                      MD5:1D98E1B2D84D7B9D0927F6B651EDE827
                                      SHA1:A1F77FF7EC77865AEF6A4C1B64CC4E3C492090A5
                                      SHA-256:A9109F45EFD9920700AAF489167AE647FB0BF88CE12AAF69502AD6D1505CB7B3
                                      SHA-512:A13756009BC37481EBA3B8523EC0458A43459E34F8A81CFC924E20F9B7A68936DF4B321376B5C4DFE464E5AE403876EBB3CE96EE394C7BF1B46094CE9BC2E958
                                      Malicious:false
                                      Preview:.PNG........IHDR.............(-.S....sBIT.....O.....pHYs..........+......tEXtSoftware.www.inkscape.org..<.....tEXtTitle.Adwaita Folder Icons.._.....tEXtAuthor.Lapo Calamandrei..*...RtEXtCopyright.CC Attribution-ShareAlike http://creativecommons.org/licenses/by-sa/4.0/.Tb....~PLTE.........................................~...............................................................................l.....tRNS.@NS.................{IDAT.WU....0..#....9..!B...Aj)..Sv.,.....`....q..h..w..g..u.4X.x~...#S..d)...D..-W.[A4.ea...nf./.....`..|...W.}.e<.:\......~..%....IEND.B`.
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):40
                                      Entropy (8bit):4.853055907333276
                                      Encrypted:false
                                      SSDEEP:3:rqh2mJUKMJjwD:raJ8JjI
                                      MD5:6EA2EDF492D8337635DDCD02048BFA32
                                      SHA1:3F86F5C6398972128ABD8822B5BD1BFE446C6517
                                      SHA-256:35E1C059B4E54107456E898FBED2CFA59289F9272495014B4396C8ED427EBC95
                                      SHA-512:56EC3DBDA7B837E26520F90E4D336FDB95D0789BE8A15E034526ED4553683E93F9C116FC57BCAC2C37DAEA516AFAC48CEE39F5BA6363415A4DA68806E1F6BAF9
                                      Malicious:false
                                      Preview:[ARBEJDSKLIMA]..Sporangia57=SPOTTEFUGL..
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):174600
                                      Entropy (8bit):3.9275478025543364
                                      Encrypted:false
                                      SSDEEP:1536:lkoZp1DEqOBdglkr6myEGXRC5bWgiViQFpETgevYNBVe/d:qoZHq+4UXRC5b0ViQFpNQd
                                      MD5:E10F0042C0EE3B2DE59BEC61D3811C6A
                                      SHA1:0F75AEEE0338D2E563FD146847E21187C68FD75F
                                      SHA-256:20DA8A600117A2ACC6A66AD493390D1DA3F8A9CC7FF13A8185EC02A0E5C93B2B
                                      SHA-512:BA174D089A52135E9CEE8704749D9C44C4EC361C34E09C26CCFB4A34EB69590FCA77250E17B1ED68506B4C0EC958A2B17DED25741177D77CA68D05CDB1ED2FBC
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....\)b...........!......................................................................@.......................................... ..h................ ...........................................................................................rdata..p...........................@..@.rsrc...h.... ......................@..@.....\)b........T........................rdata......T....rdata$zzzdbg.... ... ...rsrc$01.....@...d...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                      Category:dropped
                                      Size (bytes):225
                                      Entropy (8bit):6.661593260259915
                                      Encrypted:false
                                      SSDEEP:3:yionv//thPl9vt3lAnsrtxBllE+UwHndZxx3hYB84wXKYAIk9d0LPoBHlNHbEezI:6v/lhPysHUunYBcXKYA59dPFxRbZofp
                                      MD5:E91514290CFC6F38580278374D3C6B0F
                                      SHA1:068CB1200349717E8D2EE64475F480C850A85099
                                      SHA-256:0DE516FC5D5A233BC240F055C70B004160CE4FA2364C93CC12D7D1A60C23420D
                                      SHA-512:A6C1523D984857924FDDEFD48741B6FB552CAC220D53619F3E572799DACC0EE06B1FBF75D9CDC127BB685BADB4933FFD4F4923E341492307C55BE4C196510C57
                                      Malicious:false
                                      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...?..A...O...V..D.t...8..Y.n....V.$......../..e...of.g.pm..pF(..,..Oq8.xb........~....$.]......y..".(..7.-.._....0...eUS.c..Y....}.J..p...M.....q=.=.B`....IEND.B`.
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):12288
                                      Entropy (8bit):5.814115788739565
                                      Encrypted:false
                                      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                      MD5:CFF85C549D536F651D4FB8387F1976F2
                                      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: Metadefender, Detection: 3%, Browse
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                      Category:dropped
                                      Size (bytes):243209
                                      Entropy (8bit):5.969458574226536
                                      Encrypted:false
                                      SSDEEP:6144:RPVByzfb1YfMq48FKMqCQQU7k1TAH1OobTrEPvQvHk8hep:RPKqUjHM/PvQvHk8hep
                                      MD5:2510EF915FD96CB0C5D947BA98CB751D
                                      SHA1:AE10088DD6EC5BD0607FD5848A746AE57DCDC20E
                                      SHA-256:02528C6E3F317B8FA9010BED22383D9BF696CC3DC9B97CC7FF81A445BE470FA1
                                      SHA-512:ACA3ED02461EB0D70EF7BF5A74F1E9C7D20446349A02485A49BE3530F9C7CCEEE8F74A412FA8FD9002A815762F240C3C89AEACC97FF84130BE428F8C9ED73E05
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............P.........C..............................0............`... .........................................V....................p..p............ ...............................T..(...................8................................text...............................`..`.data........ ......................@....rdata..`9...0...:..................@..@.pdata..p....p.......N..............@..@.xdata..\............f..............@..@.bss....P................................edata..V............~..............@..@.idata..............................@....CRT....X...........................@....tls................................@....reloc....... ......................@..B........................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.9195774738294356
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SecuriteInfo.com.generic.ml.10062.exe
                                      File size:1447056
                                      MD5:95050a1e0c7d4c57f62e26967b3b0bfd
                                      SHA1:baa57d1bf6d8a41ba89c6d09bfc4ec2bc986830c
                                      SHA256:458597ef6835136826411179f244673d5b2702e906bedb3e470786eb455d98ce
                                      SHA512:a659747a264aa16304d2d246faa277c415011ffd9c7376ac641a1193dc48c9efbbab745d9874a8aae8c4d53f050d32a2973633aab07618a2977e8502c4773549
                                      SSDEEP:24576:4Y9Mbnf2fKJdodBzdf1JJNVwYFsTtflc4DJQCXzDt+Y9O1/euTLXwwUBg/:p9Mbnf8yeBzzJJe7FXzDtr0Pfwvq/
                                      TLSH:8C65234D7B38D42BD1477B323D66CA3AADB4DA603565D75F728993EA0AE3305CD22230
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                      Icon Hash:38f8cecadad4cca2
                                      Entrypoint:0x403640
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:61259b55b8912888e90f516ca08dc514
                                      Signature Valid:false
                                      Signature Issuer:CN=&#34;Brechernes6 originalbillederne Brazing Jagtdistrikter3 &#34;, O=Gennemloebe, L=Saint-Fr&#195;&#169;zal-d'Albuges, S=Occitanie, C=FR
                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                      Error Number:-2146762487
                                      Not Before, Not After
                                      • 25/05/2022 17:12:28 25/05/2023 17:12:28
                                      Subject Chain
                                      • CN=&#34;Brechernes6 originalbillederne Brazing Jagtdistrikter3 &#34;, O=Gennemloebe, L=Saint-Fr&#195;&#169;zal-d'Albuges, S=Occitanie, C=FR
                                      Version:3
                                      Thumbprint MD5:8E7DC2F9F1AD6C2CDA6D266EDBD6ABFD
                                      Thumbprint SHA-1:E691195416A055DD79B76CC251E1145D615EB842
                                      Thumbprint SHA-256:F9208891F5FE35BC2ACD0351EC70F6955E51D254E0E594A885A216DFBEAFB35E
                                      Serial:3583CC204911C9D6
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 000003F4h
                                      push ebx
                                      push esi
                                      push edi
                                      push 00000020h
                                      pop edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [ebp-14h], ebx
                                      mov dword ptr [ebp-04h], 0040A230h
                                      mov dword ptr [ebp-10h], ebx
                                      call dword ptr [004080C8h]
                                      mov esi, dword ptr [004080CCh]
                                      lea eax, dword ptr [ebp-00000140h]
                                      push eax
                                      mov dword ptr [ebp-0000012Ch], ebx
                                      mov dword ptr [ebp-2Ch], ebx
                                      mov dword ptr [ebp-28h], ebx
                                      mov dword ptr [ebp-00000140h], 0000011Ch
                                      call esi
                                      test eax, eax
                                      jne 00007FAD8CAF996Ah
                                      lea eax, dword ptr [ebp-00000140h]
                                      mov dword ptr [ebp-00000140h], 00000114h
                                      push eax
                                      call esi
                                      mov ax, word ptr [ebp-0000012Ch]
                                      mov ecx, dword ptr [ebp-00000112h]
                                      sub ax, 00000053h
                                      add ecx, FFFFFFD0h
                                      neg ax
                                      sbb eax, eax
                                      mov byte ptr [ebp-26h], 00000004h
                                      not eax
                                      and eax, ecx
                                      mov word ptr [ebp-2Ch], ax
                                      cmp dword ptr [ebp-0000013Ch], 0Ah
                                      jnc 00007FAD8CAF993Ah
                                      and word ptr [ebp-00000132h], 0000h
                                      mov eax, dword ptr [ebp-00000134h]
                                      movzx ecx, byte ptr [ebp-00000138h]
                                      mov dword ptr [0042A318h], eax
                                      xor eax, eax
                                      mov ah, byte ptr [ebp-0000013Ch]
                                      movzx eax, ax
                                      or eax, ecx
                                      xor ecx, ecx
                                      mov ch, byte ptr [ebp-2Ch]
                                      movzx ecx, cx
                                      shl eax, 10h
                                      or eax, ecx
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x22d68.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x15f5800x1f10
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                      .ndata0x2b0000x300000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x5b0000x22d680x22e00False0.596998207885data6.16097805989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0x5b2f80x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                      RT_ICON0x6bb200xd4b1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                      RT_ICON0x78fd80x25a8dataEnglishUnited States
                                      RT_ICON0x7b5800x10a8dataEnglishUnited States
                                      RT_ICON0x7c6280x988dataEnglishUnited States
                                      RT_ICON0x7cfb00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                      RT_DIALOG0x7d4180x100dataEnglishUnited States
                                      RT_DIALOG0x7d5180x11cdataEnglishUnited States
                                      RT_DIALOG0x7d6380xc4dataEnglishUnited States
                                      RT_DIALOG0x7d7000x60dataEnglishUnited States
                                      RT_GROUP_ICON0x7d7600x5adataEnglishUnited States
                                      RT_VERSION0x7d7c00x264dataEnglishUnited States
                                      RT_MANIFEST0x7da280x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                                      DLLImport
                                      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                      DescriptionData
                                      LegalCopyrightMyotoniasgrupp96
                                      FileVersion0.2.16
                                      CompanyNamePARACHROMELI
                                      LegalTrademarksbrnesa
                                      Commentsansp
                                      ProductNametomtersselv
                                      FileDescriptionPolstrende
                                      Translation0x0409 0x04b0
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.11.202.56.57.2249763802018752 05/25/22-22:44:01.684322TCP2018752ET TROJAN Generic .bin download from Dotted Quad4976380192.168.11.202.56.57.22
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 25, 2022 22:44:01.665100098 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.683654070 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.683852911 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.684322119 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.702908993 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.702997923 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703053951 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.703083038 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703131914 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703178883 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703224897 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703269958 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703285933 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.703334093 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703356981 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.703396082 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703428984 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.703459978 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.703500986 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.703644991 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756292105 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756356001 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756403923 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756457090 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756465912 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756513119 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756586075 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756611109 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756664991 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756711960 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756767035 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756782055 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756833076 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756836891 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756891012 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756907940 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.756953955 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.756978989 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757015944 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757061958 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757110119 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757114887 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757153988 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757184029 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757213116 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757246971 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757297039 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757301092 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757354021 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757400036 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757411957 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757466078 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.757471085 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757556915 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.757637024 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.760592937 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.760972977 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776019096 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776097059 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776154995 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776319981 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776365995 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776386976 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776417017 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776472092 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776475906 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776551962 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776552916 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776626110 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776683092 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776715040 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776751041 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776796103 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776818991 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776859045 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776901007 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.776940107 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.776969910 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777030945 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777062893 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777096987 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777112007 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777173042 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777190924 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777249098 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777271032 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777326107 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777378082 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777385950 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777431011 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777456045 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777504921 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777539015 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777594090 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777601957 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777657032 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777707100 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777710915 CEST4976380192.168.11.202.56.57.22
                                      May 25, 2022 22:44:01.777769089 CEST80497632.56.57.22192.168.11.20
                                      May 25, 2022 22:44:01.777772903 CEST4976380192.168.11.202.56.57.22
                                      • 2.56.57.22
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.11.20497632.56.57.2280C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      TimestampkBytes transferredDirectionData
                                      May 25, 2022 22:44:01.684322119 CEST10413OUTGET /yendexoriginwithoutfilter_rtSDhNF87.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                      Host: 2.56.57.22
                                      Cache-Control: no-cache
                                      May 25, 2022 22:44:01.702908993 CEST10415INHTTP/1.1 200 OK
                                      Content-Type: application/octet-stream
                                      Last-Modified: Wed, 25 May 2022 16:11:12 GMT
                                      Accept-Ranges: bytes
                                      ETag: "f3e0cdd5270d81:0"
                                      Server: Microsoft-IIS/10.0
                                      Date: Wed, 25 May 2022 20:44:01 GMT
                                      Content-Length: 219200
                                      Data Raw: 88 87 c7 f6 20 02 7c a8 be 0f 6a e9 29 8e 51 dd 44 02 e0 2a 7f 41 71 6c d0 84 8d 68 47 88 24 43 34 be 28 b9 1c 1a 8b 23 46 82 7a df e0 b0 53 78 1b b2 05 c2 86 12 85 00 c8 36 be 12 ab 6b bd 88 0d 1c ef 4c 98 5f 9e 66 72 bd 2e 0d be f3 b3 cf e0 96 85 7f eb f0 a5 e9 4b f2 07 bf ec 14 b6 d0 49 4d b0 b4 69 16 bf 75 4d 6f d4 78 e4 5d de 3e 95 44 43 01 e8 c5 1a 9e a4 d0 f4 9f 24 0d fb 41 72 bb 35 ff a1 5d 5b 48 04 d2 7e 3b 18 bd 5c cd 8d 94 47 95 e4 4d e3 99 31 80 01 14 48 f5 ce 8e 19 e9 ce d6 d6 16 81 5d 9a 02 57 aa c8 66 f0 a1 c6 9c 98 cd 37 16 34 47 27 ba 21 e3 1f fc 13 e1 df 0c c8 37 e5 b7 ea 5d 31 ba 76 cb b7 ec b5 44 6d e6 d6 0d c7 43 bc dd 8a 07 6f ae be 4e d2 26 34 c3 ab 50 8b b1 15 5c cd e2 9d 4e 56 52 b2 e2 a9 57 21 ec 58 27 6a 1e d9 8e be fd 46 50 6b bb 41 44 d8 12 e3 17 8d 92 e4 17 d9 05 99 2a 53 81 16 9d 10 95 67 9a e3 ec c0 46 78 b3 84 83 be 49 7b 82 5a fe 79 e4 70 ea ae 40 ce a0 ca 2b 81 5d cb c7 fa 49 16 04 4a 40 4e d3 26 06 0a 71 fc b9 74 22 b9 a9 11 be 36 b3 fe e5 2d 5c ca 08 11 fe 68 cf 08 60 85 0f 69 24 88 f0 7e d5 c7 d9 db db fa b8 75 4e 17 85 dd 14 69 3f b5 08 b4 8b 50 8d 43 15 e5 79 9a a7 96 17 5c a9 fe 01 1d 11 98 63 ed 7a ef 0b 82 d7 6b e4 92 9d 3f e9 e3 4f c2 1f b3 6c 2f 35 f7 10 b4 f1 ea d1 3a a1 bf c8 cd f9 41 31 92 fa 6d 12 c0 62 86 82 95 ac fd 35 b5 84 64 39 e3 4f 8b c2 7b 6f 39 9e b5 8a a8 aa 59 3a f2 81 37 7b 75 1b 27 25 13 9e 81 63 74 85 d7 29 4b 2e c6 9d 2d 11 b1 fd da e8 9b be 73 ec 5a af 4f 1f ac de ae 78 16 b9 79 5c 91 6c ee 29 02 ae f3 b0 c4 7e fd e9 4a 5a a6 aa 8b 4a ed 81 39 cb f6 d0 ab 5e ef 83 d1 03 63 fa 05 21 81 f4 15 61 03 81 2a 4f 8b 55 f9 da c4 b8 01 b5 6a dd bb 57 76 06 46 2f 84 31 bc 05 3c f8 c3 7d 64 10 8f 9f 1a 5f 1f fb 0e 0d 2e 93 bb 29 67 84 5c e7 c7 82 27 e2 d3 74 38 e5 de a4 b1 2a 3c d7 7a 10 a6 3d 54 d9 de 9a f1 94 19 9d a0 e2 f2 d5 fb 32 6a 35 73 13 de 70 08 cf ab 09 74 5d e5 5c 03 fb 5a d3 29 8b 38 bf e0 e4 08 24 26 16 d7 8d 95 a0 d0 54 8f 1d 9e ec e2 29 d0 cf f4 35 6a b2 b7 4c 11 1a 66 d2 1c a6 d8 bb 69 36 e7 fb c8 d9 b4 61 2a e7 0f 45 89 4a 37 d6 46 a9 5b 7a be 4b c2 a8 c2 7d 0f 69 d7 70 85 e3 f0 48 30 51 f2 96 50 ff 7a 6d 96 17 48 bc 90 58 b2 81 a5 d1 50 2c 19 84 c2 d0 34 a3 b2 c6 06 de 81 90 e6 16 02 6a 74 1b 9a 11 54 76 a0 39 2b 3b 6b ef 12 ec fc 63 10 a6 4c 6b 09 6a 7a 9e 91 30 46 16 ac 82 af fe 71 07 36 d2 d2 74 3a 6e 8b 18 13 2c 87 e3 2c ea f0 27 1f f7 5b d0 d7 90 23 28 f2 7b e4 e0 e9 97 0d 2e 74 e7 37 b9 f0 bd 2d 65 bb ea f6 b3 4c 4d 4e 1d 5d 0b 1b 13 3f b1 04 e7 4c 9e 39 f2 c4 d1 a9 eb 6f 09 79 6f db 7d 8d 65 84 bd 02 7f 63 fe c1 aa dd 31 2c f4 6e 91 ed fe 5b fd 04 8c bc 2c 3b 6b 52 bd a3 b6 96 5a 70 7d cd a7 10 f8 d7 60 9c 17 25 b5 19 7c 5c ca 96 c0 33 ca c0 98 f4 13 bc 3a f0 41 46 64 e8 5e d8 f3 10 89 82 51 d9 f6 ab 92 03 89 ae 5a 3f 2b af ed 08 47 5e 81 4d b7 5d b5 64 5d 5e 50 09 41 0c b7 a0 55 96 85 75 c1 e3 95 eb 0b dc 07 bf ec 11 b6 d0 58 5b bb 9f 72 16 b8 62 b3 6e f8 7a fc 56 de 39 83 ba 42 2d ea d2 11 9e a3 c8 0a 9e 88 0f d0 43 57 47 8d f2 89 f8 52 85 2f 42 6d 77 d5 96 22 a5 e4 f4 57 e7 96 0a 84 eb 50 eb 21 77 38 8d ab ca 76 c9 ab a4 08 65 d8 31 a2 60 39 8d 9a d7 a2 ad a9 e4 f7 a8 1e 03 c7 4c 2f b8 0a e1 34 1f 11 c9 9c 49 c8 3d 83 a5 d9 5f f1 41 92 aa b7 eb b5 44 7c f0 dd 26 3c 43 b9 cb 7f 07 48 ac a6 0b d1 21 22 35 aa 7c 89 a6 1e 5c 74 97 60 4f 7a 70 99 e0 82
                                      Data Ascii: |j)QD*AqlhG$C4(#FzSx6kL_fr.KIMiuMox]>DC$Ar5][H~;\GM1H]Wf74G'!7]1vDmCoN&4P\NVRW!X'jFPkAD*SgFxI{Zyp@+]IJ@N&qt"6-\h`i$~uNi?PCy\czk?Ol/5:A1mb5d9O{o9Y:7{u'%ct)K.-sZOxy\l)~JZJ9^c!a*OUjWvF/1<}d_.)g\'t8*<z=T2j5spt]\Z)8$&T)5jLfi6a*EJ7F[zK}ipH0QPzmHXP,4jtTv9+;kcLkjz0Fq6t:n,,'[#({.t7-eLMN]?L9oyo}ec1,n[,;kRZp}`%|\3:AFd^QZ?+G^M]d]^PAUuX[rbnzV9B-CWGR/Bmw"WP!w8ve1`9L/4I=_AD|&<CH!"5|\t`Ozp


                                      Click to jump to process

                                      Target ID:1
                                      Start time:22:43:31
                                      Start date:25/05/2022
                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
                                      Imagebase:0x400000
                                      File size:1447056 bytes
                                      MD5 hash:95050A1E0C7D4C57F62E26967B3B0BFD
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.62482366099.00000000032B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:3
                                      Start time:22:43:49
                                      Start date:25/05/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
                                      Imagebase:0x50000
                                      File size:108664 bytes
                                      MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:4
                                      Start time:22:43:49
                                      Start date:25/05/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
                                      Imagebase:0x140000
                                      File size:108664 bytes
                                      MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:5
                                      Start time:22:43:49
                                      Start date:25/05/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
                                      Imagebase:0xad0000
                                      File size:108664 bytes
                                      MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.67212135583.000000001D4E1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000000.62332198808.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate

                                      Target ID:6
                                      Start time:22:43:49
                                      Start date:25/05/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff752a40000
                                      File size:875008 bytes
                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      No disassembly