Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HfJLn9erXb.exe

Overview

General Information

Sample Name:HfJLn9erXb.exe
Original Sample Name:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6.exe
Analysis ID:829104
MD5:049ecad4587538c292e3ebeee5947eb5
SHA1:12aabeb19083dd114b7b94c836b031de3945d2c9
SHA256:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6
Tags:exesigned
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • HfJLn9erXb.exe (PID: 5844 cmdline: C:\Users\user\Desktop\HfJLn9erXb.exe MD5: 049ECAD4587538C292E3EBEEE5947EB5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.775983857.0000000003AEC000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: HfJLn9erXb.exe PID: 5844JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: HfJLn9erXb.exeReversingLabs: Detection: 51%
      Source: HfJLn9erXb.exeVirustotal: Detection: 28%Perma Link
      Source: HfJLn9erXb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: HfJLn9erXb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.dr
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_0040626D FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004026FE FindFirstFileA,
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
      Source: HfJLn9erXb.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: HfJLn9erXb.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/0
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004051CF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
      Source: HfJLn9erXb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAEGISIIIRadeonHelper< vs HfJLn9erXb.exe
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_00404A0E
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004065F6
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_72FB1A9C
      Source: HfJLn9erXb.exeStatic PE information: invalid certificate
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess Stats: CPU usage > 98%
      Source: HfJLn9erXb.exeReversingLabs: Detection: 51%
      Source: HfJLn9erXb.exeVirustotal: Detection: 28%
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile read: C:\Users\user\Desktop\HfJLn9erXb.exeJump to behavior
      Source: HfJLn9erXb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Roaming\fumigatoriumJump to behavior
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Local\Temp\nscE1A6.tmpJump to behavior
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile written: C:\Users\user\AppData\Local\Temp\Kontos.iniJump to behavior
      Source: classification engineClassification label: mal68.troj.evad.winEXE@1/17@0/0
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_0040449B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
      Source: HfJLn9erXb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: HfJLn9erXb.exe, 00000000.00000003.255683971.0000000002767000.00000004.00000020.00020000.00000000.sdmp, AEGISIIIRadeonHelper.dll.0.dr

      Data Obfuscation

      barindex
      Source: Yara matchFile source: Process Memory Space: HfJLn9erXb.exe PID: 5844, type: MEMORYSTR
      Source: Yara matchFile source: 00000000.00000002.775983857.0000000003AEC000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_72FB2F20 push eax; ret
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_72FB1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Local\Temp\nspE6C8.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeFile created: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dllJump to dropped file
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeRDTSC instruction interceptor: First address: 0000000004082CBC second address: 0000000004082CBC instructions: 0x00000000 rdtsc 0x00000002 fnop 0x00000004 cmp edx, ecx 0x00000006 cmp ebx, ecx 0x00000008 jc 00007F6EB05ADE1Ch 0x0000000a cmp ah, FFFFFF9Ch 0x0000000d cmp cx, ax 0x00000010 inc ebp 0x00000011 cmp al, dl 0x00000013 inc ebx 0x00000014 cmp ch, dh 0x00000016 rdtsc
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dllJump to dropped file
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_0040626D FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004026FE FindFirstFileA,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_72FB1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
      Source: C:\Users\user\Desktop\HfJLn9erXb.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Native API
      Path Interception1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Access Token Manipulation
      LSASS Memory3
      File and Directory Discovery
      Remote Desktop Protocol1
      Clipboard Data
      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account Manager13
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      HfJLn9erXb.exe51%ReversingLabsWin32.Trojan.Nemesis
      HfJLn9erXb.exe29%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nspE6C8.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dll0%ReversingLabs
      SourceDetectionScannerLabelLinkDownload
      0.2.HfJLn9erXb.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
      0.0.HfJLn9erXb.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorHfJLn9erXb.exefalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorHfJLn9erXb.exefalse
          high
          No contacted IP infos
          Joe Sandbox Version:37.0.0 Beryl
          Analysis ID:829104
          Start date and time:2023-03-17 20:28:36 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 7m 42s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:HfJLn9erXb.exe
          Original Sample Name:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6.exe
          Detection:MAL
          Classification:mal68.troj.evad.winEXE@1/17@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 63.2% (good quality ratio 61.9%)
          • Quality average: 89%
          • Quality standard deviation: 21.5%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):54
          Entropy (8bit):4.838039816898156
          Encrypted:false
          SSDEEP:3:7KG/LmI/cXQQLQIfLBJXmgxv:OG/LmI/cXQQkIP2I
          MD5:FB5EE2C0CAC332EC8390F50016EF0769
          SHA1:11D9FB52FE5289140B9D52A38B56F99512B3A3A7
          SHA-256:C557AFE51AB22916E3423820A09D3805BF9DCDCECBEC4FE8DE2C67FB023BA631
          SHA-512:87CCEA7B203B8BFC4E21544FE4FE9693AF230E246C450E673410565791DFE8257E30354772FDCC114C7068D9295FDB491E9B52D1A3B490C0756E568B70B95C0A
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:[Bedrock]..Interthing=user32::EnumWindows(i r1 ,i 0)..
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):11776
          Entropy (8bit):5.832316471889005
          Encrypted:false
          SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
          MD5:B0C77267F13B2F87C084FD86EF51CCFC
          SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
          SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
          SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:moderate, very likely benign file
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
          Category:dropped
          Size (bytes):34016
          Entropy (8bit):6.1021284380541925
          Encrypted:false
          SSDEEP:384:JP7a6wQdSCVWSdoEdXjYmxzfkfIwuWR7UPMEdxsTStsBdMQJK2wKucYkcuhV3:N7a6eiHdFdr7W5UPMgy+OBG2X90uhV3
          MD5:4FC7FC174E80C178225C2509027DF961
          SHA1:9FF62413EC0DD462F5F016EBC804F1D736D24796
          SHA-256:866B31DD39B97DEDAFD0FBD5672639EE91B47AD319C47816B4F6D01BFF93FF8C
          SHA-512:29261B9ABC4AF2F51C05B61A37721BC737B411530361A4B48A7BFFAB0F8263EA75BFD51B6E6E94E91E1D02DC442B534C3334B05FD8324E7CF307FA08179A1ED9
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:moderate, very likely benign file
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.oPZ.oPZ.oPS..PR.oP..nQX.oP..jQK.oP..kQR.oP..lQX.oP).nQY.oPZ.nPt.oP..fQY.oP..oQ[.oP..P[.oPZ..P[.oP..mQ[.oPRichZ.oP........PE..d....5;a.........." .....0...:.......................................................F....`..........................................\.......]..........H............f..........H....O..p...........................@P...............@..p............................text............0.................. ..`.rdata...#...@...$...4..............@..@.data...@....p.......X..............@....pdata...............Z..............@..@.rsrc...H............^..............@..@.reloc..H............d..............@..B................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:data
          Category:dropped
          Size (bytes):297815
          Entropy (8bit):6.803960139750454
          Encrypted:false
          SSDEEP:6144:J35PGszPFp+EB9h18KeMJwYQl/w+ByCHqLBmv:J3FGsz93N8Kp60Bg
          MD5:12DF13549A2F50FB06EAAC92D2F36C05
          SHA1:5E1CD0421664E97B44B2C26960F4D298DAED0C99
          SHA-256:4EE38AAF3380FB3D7C4F57800A1692175C1D772E3A11028874CF2D8F5DC599F2
          SHA-512:6DD5811B457913D37B922904678A508A1762CDA447C195A660457B19D6302DB8E21586AFF0F22D41D73514CA926FEFE8554777EB558BD321ABF5B76C06527848
          Malicious:false
          Reputation:low
          Preview:.........T.........h........................@...KK.........[......W......b...................F................,........DD.......WW...................[..........P.'.........hhh.......^^....JJ....x.......F......aaa............................!............IIII...............WW.i......\\..................q.22...........m...555...........m..7.k......m...................c.QQ.........................,.......cc...........?..xxx...............4.........^.....................]].444.XX.........................................ggg..........]....jjjjj..77...........bbb...<<.................++......XX.......!!..qqq...............@.......eeee........[................00.A............................H.yyyyy.....FFFFF..kk.555........lll...H........ssss...MM..j........G...^^...........~.........PP............. ...............III.....}}}...........................""".....))...UU...l.)))).........++...%%..........######....hhh............::..^.5.....(((..............................n..""........zzzzzz......
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:data
          Category:dropped
          Size (bytes):42836
          Entropy (8bit):4.578518141395867
          Encrypted:false
          SSDEEP:768:AGQ+v3ebyf4b4Yv6Dub2I+MxA83BMUBaPqbIvcbYIrf:NQ+WApD42MxBMMaPqbZbYIrf
          MD5:3DAD0F9AF0356D18A46167665A352768
          SHA1:E5D083D2224DE4FC9105CB966CF3A53F9BB7D3C0
          SHA-256:8A124F4091887491B8FABE0C0C694B95C2D76F68FB4E9292C59FA5971074899C
          SHA-512:7CD0CF5AF5B79A146F22A2D68CC3500AF6068F1BFA48B5730E2C2236201E4B6B7CCED4DBB9121A525F41FC63C07403D1CB40F9267FBF81C5FFC2CB4FA6221E98
          Malicious:false
          Preview:.....WWW.......T..00.............A............>>>.lll.......NNNN........&...........s.$$$....................................++.;;;;...................TT........l.o..........ll.......vv.............+..............V.....'.>.....a....................y.!...{{{.11.<...333......................6666....ee................_.........5......88.............%%..<...........R.................................]]]].........888..............a.n..C.............>............P.....;;.....HHH.........bb.........eee...............QQ..cc..`....................................b.w.......--......GGG...JJJ.U......uu.VV....v..ii. ............FF.........K........................1.............44444.........................QQQ....,.//.....w...........ll.....SS....(.......H............B.....OOOO.........__....l..........................}..//.vvvv....ii................~~~..EEE..MM..............L.@@.....G...........:.................888..........))..............?......FF.......DDDD..............@@@@@...................
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):140
          Entropy (8bit):5.529383944212929
          Encrypted:false
          SSDEEP:3:yionv//thPl9vt3lAnsrtxBllDM9vFW0p/sXm1MMos9DwlTYTbklt/sbp:6v/lhPysx8vFW0pkX4iZlTYTI3Ebp
          MD5:4308BBBAB1DB146494AE5ABB07B8E6DB
          SHA1:58121574EEB070E26DDD75A964F3548E176E58A4
          SHA-256:EFB732049C674EB25BFCB2FA0CBCC45D24190BF1479C054647F424B31E34C828
          SHA-512:41C9B37516F8D6AB7155F890EE36C26FE4161383A93BFBF696AB18292774C3556642E898361D21CECCBFEFFAF5814495CFAC2C74791E02F068B055BD3AD87DE4
          Malicious:false
          Preview:.PNG........IHDR................a....sBIT....|.d....CIDAT8.c`.J..R..(...\.`..2.Y3...k.i......b..PN.....J.@6.l.`.Pd..A.....O...D....IEND.B`.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):147
          Entropy (8bit):5.834297280344084
          Encrypted:false
          SSDEEP:3:yionv//thPl9vt3lAnsrtxBllPhF1MzoQxJrN7djpdXLImeR/mV2kg1p:6v/lhPysx1MzoQxlRZbCRaip
          MD5:38D787F55E22FB591135F9250CD259D4
          SHA1:0E135B0E1CA49A6E43DB4CB7596FAEA022E23924
          SHA-256:1ED839B015A67CAB9948469975411D982A96314CE82851EA2F9F6BB8D733A002
          SHA-512:4E21AB54B7110B4CD2EBC0E2CF6DF3F8C7C988495BCCA76949BC3C5EB669A793FCCDA5CB4DDB7B627A21734BD181FE44670757144CC2A007FCB695405F08EC2B
          Malicious:false
          Preview:.PNG........IHDR................a....sBIT....|.d....JIDAT8.c`..0b..O..&J]@5....tR.>........`.8.(6....-Z....a..&..3 ....4...<.............IEND.B`.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          Category:dropped
          Size (bytes):9515
          Entropy (8bit):5.04214621707661
          Encrypted:false
          SSDEEP:192:icoGT04mzNN8hYivh5gtE/PkjY09fdNQuQ:ibGg4mzNhi4tEHoDfHQuQ
          MD5:7B02E1AE16E2E709D7C97DE560B4DBE9
          SHA1:191A54644417F7D36F5CB4182DCDB3737D74BE51
          SHA-256:DA0B58F52BBC131F967942D1D8E9DE1B5721AE864BC21852A0AD4062332297CB
          SHA-512:4F689F854DB3F766B5E53CE2F19E9F8293C075EE3F9B18098EB05B352F2EC95DF85E49A78540781EB531BCE60C7B1F7890F1FE3C65200DEC3CB908E90FB827A1
          Malicious:false
          Preview:.;!@Lang2@!UTF-8!..; : Francisco Jr..; 4.37 : Fabricio Biazzotto ..; 18.05 : Atualizado por Felipe..;..;..;..;..;..;..;..;..0..7-Zip..Portuguese Brazilian..Portugu.s Brasileiro..401..OK..Cancelar........&Sim..&N.o..&Fechar..Ajuda....&Continuar..440..Sim pra &Todos..N.o pra T&odos..Parar..Reiniciar..&Em 2. plano..&Em 1. plano..&Pausar..Pausado..Voc. tem certeza que voc. quer cancelar?..500..&Arquivo..&Editar..&Visualizar..F&avoritos..&Ferramentas..&Ajuda..540..&Abrir..Abrir &por Dentro..Abrir p&or Fora..&Visualizar..&Editar..Re&nomear..&Copiar Para.....&Mover Para.....&Apagar..&Dividir arquivo.....Com&binar arquivos.....P&ropriedades..Comen&t.rio..Calcular checksum..Diff..Criar Pasta..Criar Arquivo..S&air..Link..&Correntes Alternantes..600..Selecionar &Tudo..Desmarcar Tudo..&Inverter Sele..o..Selecionar.....Desmarcar.....Selecionar por Tipo..Desfazer sele..o por Tipo..700...co&nes Grandes...c&ones Pequenos..&Lista..&Detalhes..730..Desorganizado..Visualiza..o
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:SVG Scalable Vector Graphics image
          Category:dropped
          Size (bytes):266
          Entropy (8bit):4.986245244009802
          Encrypted:false
          SSDEEP:6:tI9mc4slzc8SRIKMNo/aMhFl1OkUjq5eKVrGDVfqKlNK+:t4C8LKMuyMhPobjoprGDRlj
          MD5:8B727826F9D8C0C7C954EDE912CB0DEB
          SHA1:1518AA80747326B5353C22D32E57A33D61285119
          SHA-256:0783A7F518D3879C8F0F50B45FBD779A98652469E9B7C659CE41F14D1629D334
          SHA-512:0ABB243F9D1E0B6EDA0CB25D35C3449AB2B5B83078208F11B876A27FF11FF70B79F8BA97D4DA3AED21A8314C75FB2174D9378AF59B57DCB99DFF681D9AAB8561
          Malicious:false
          Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <path d="M8 1a3 3 0 100 6 3 3 0 000-6zM6.5 8A4.49 4.49 0 002 12.5V14c0 1 1 1 1 1h10s1 0 1-1v-1.5A4.49 4.49 0 009.5 8z" style="marker:none" color="#bebebe" overflow="visible" fill="#2e3436"/>.</svg>.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
          Category:dropped
          Size (bytes):12193
          Entropy (8bit):4.4720152705808935
          Encrypted:false
          SSDEEP:192:i2PDEeaNB1PmcptkcDHxbTvPnc67bMxQxGx4ch/JuLQRcg/oN96bPNljYiYr197:ikDFKBFmcPLx3HPnIsqrJuqcgAN96b87
          MD5:3C21135144AC7452E7DB66F0214F9D68
          SHA1:B1EC0589D769EAB5E4E8F0F8C21B157EF5EBB47D
          SHA-256:D095879B8BBC67A1C9875C5E9896942BACF730BD76155C06105544408068C59E
          SHA-512:0446A0E2570A1F360FD8700FD4C869C7E2DBB9476BBDEC2526A53844074C79691542B91455343C50941B8A6D5E02A58EE6AA539CC4C4AE9CF000B4034EF663E2
          Malicious:false
          Preview:.;!@Lang2@!UTF-8!..; : Kirill Gulyakevitch..; 9.07 : 2011-03-15 : Drive DRKA..;..;..;..;..;..;..;..;..;..0..7-Zip..Belarusian..............401..OK................&.....&....&......................&............440..... ... &........ ... .&.......................&.......&.. ....... ......&......... ......... ........ ....... .......... ........?..500..&......&........&........&..........&.......&.........540..&................ &................... .&................&................&.........&......... ......&........... ......&............&..... ..........&.'...... .............&...........&................. ......Diff..&........ .
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:SVG Scalable Vector Graphics image
          Category:dropped
          Size (bytes):998
          Entropy (8bit):5.186938379246791
          Encrypted:false
          SSDEEP:24:t4CBGD0QNRWLLxo2em0yKbRAecFxV0/wXK:gDrc0NtAecFiH
          MD5:CB1EEE7BDB582B756D0F68EF02D6D96D
          SHA1:9E9B0F25BC472EF1C1C13EEAC12FD11C4CC0D2D9
          SHA-256:20EA767E852A8EBF2C5BA16D56CBAE10BD09D6CBA89B372A57EAA973AD3281B4
          SHA-512:E22FAEAE78D244A0F4E7215B31125D5AA4FD66C0720B0DE61D12084EAB879D7A9E231CCD5CD431417115B0945B450DC348DA400D67DB1898513B7BD6B9C274DB
          Malicious:false
          Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#bebebe" fill="#474747"><path d="M3 9h10c.554 0 1 .446 1 1v3c0 .554-.446 1-1 1H3c-.554 0-1-.446-1-1v-3c0-.554.446-1 1-1z" style="marker:none" overflow="visible"/><path d="M7 0s-.709-.014-1.447.356C4.814.725 4 1.666 4 3v3h2V3c0-.667.186-.725.447-.855C6.71 2.014 7 2 7 2h2s.291.014.553.145c.261.13.447.188.447.855v8h2V3c0-1.333-.814-2.275-1.553-2.644C9.71-.014 9 0 9 0z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M2 12h12v4H2z" style="marker:none" overflow="visible"/></g></svg>
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1245
          Entropy (8bit):5.462849750105637
          Encrypted:false
          SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
          MD5:5343C1A8B203C162A3BF3870D9F50FD4
          SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
          SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
          SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
          Malicious:false
          Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):555
          Entropy (8bit):7.499536740374189
          Encrypted:false
          SSDEEP:12:6v/7anZhFxDEKwjAq0kaO/yvSL6T1pjNngLpzPanwmB9HE4JqSjF:5bDEPxdqKLmpqLdynw29kEqSZ
          MD5:BFF011148B773FA44B9A9BB029E8CC52
          SHA1:F2B838927E320D12649CEFDEA3AFE383C6650D7C
          SHA-256:B21DE7B432A7A67544D007ECC0FDD95F8E8C6129AF558A32102EE04C08635653
          SHA-512:A57C83AEE0E1F4C530D2F5B90589C31FD6E2FF8F62F998963284218FAC5EE164BCA7A619A9597DC3E2ECD0095A2CF04467E89EDF86700E1A90B3DF60B5121C9B
          Malicious:false
          Preview:.PNG........IHDR................a....IDATx......A....v...b.m.A..Q..Q..UD5.F.m.....fs{9.}...V.`....%.kt....R...+%7.}p..@.}:..u466`.6uu.tvv...N6....D"Q......po".;.4....W..g.b..\.~?...<.../.....$..5....................r.+..ah...F;.H.`b ....4.[...k.6.<..Kk.m[h..x`...R...z{.H.......Oax.e..{.........w._...c._>..6..T*HY.1! e.#....G......{.AB..l.K"..P(..j..$.R.}L.5.....@.>.......X...hE....L.."L.....=~..7n.2.,RJ.01.....B.AWW..<q......Ng.,../.Z...+...N].r.5.EB.p$..!,....,......SW.TD+U...K...ee._.N*.[..`..1q..v\#6..?;7..4..3....IEND.B`.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:SVG Scalable Vector Graphics image
          Category:dropped
          Size (bytes):680
          Entropy (8bit):5.109191824773878
          Encrypted:false
          SSDEEP:12:t4CP5GEA9xI7jhz4AeW02KdTwWjhz4AeW02KdTPqkoop4p:t4CBGEAgF4AeW0/N4AeW0/Zqg4p
          MD5:379690952AAA576521D51249D404CBCD
          SHA1:61A8A95B0454422AA47379CF983B99FFDD839439
          SHA-256:EAD402FB0B85DB153356EC695016FD4F2C4031367D8ED6D1C1EF5FF4F28A8DE8
          SHA-512:35B6BC866C3D02A2486D3447C82405103DE89D46940F7FE44A7009E714BBA57FBE601EEC939C3206ADB06FB31C4FD1D3822A0ED52A346ACFDE5908643432F928
          Malicious:false
          Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#000" fill="#474747"><path d="M13 5v2h1v5H4v2h12V5z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M0 2v9h12V2zm2 2h8v5H2z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M3 7c2.32 1 3.045-1.66 6 0v1H3z" style="marker:none" overflow="visible" opacity=".35"/></g></svg>
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):220
          Entropy (8bit):6.546211943247282
          Encrypted:false
          SSDEEP:6:6v/lhPysde0C1jngP3V95D2tOA/RDvhpLUxbVp:6v/7jC1zi3Sr/hW
          MD5:C84EE7522C124892455BB09DEBCF9340
          SHA1:AF87A2A5688346A3902762DD250328B7EF224620
          SHA-256:E0A3BD6FE1A1BAEFFE04BCA2980ADF755F888E31DCE3686B16C5DAC4202A38C8
          SHA-512:3BEED79366F15CD075781F677C0C9E84081D2189D1FB541A34AA25980B48701A3D93DC550E4ABEB550EFBE3167B1CAB8338E22F4603C6A71936876FBA75FAD58
          Malicious:false
          Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..P.../z.Q..Kx....l.b. )...x........t.......Y~.)......7......W.xk.'A...u.........%..!k.k5.|E=+X..,,a.S.H4p*D8.8(FH.a..5.x...%.....7..8s:.......IEND.B`.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):144
          Entropy (8bit):5.708279548998072
          Encrypted:false
          SSDEEP:3:yionv//thPl9vt3lAnsrtxBllAoSF1/LvgStjP9f9uvJYUo+/JHt//sup:6v/lhPysKo21/Lvlt7V9+YUouJH1/jp
          MD5:1ED278AD206D6EA33FF787DD326E0FC5
          SHA1:8CFF7AD12FC0E5545E71D05879A0245BEDAF4D46
          SHA-256:CC88E76F7C7D2E5B07E49D1F2AD88F8BAFC0542EB11CEB2B2FFF235C87AB4417
          SHA-512:7291085B6153C02EDBF679CDDB93B97DBB74943F216EB622CE9722E02613269F626F8A7A5BE8DA683153E9AEE22C40ED7264E8A0ED62A99F477E2B96642596BF
          Malicious:false
          Preview:.PNG........IHDR................a....sBIT....|.d....GIDAT8.c`..0...O.Z&J]0.. ...&u]..5?......b....Q.E./.....t@..,....)1..,b...#.=....IEND.B`.
          Process:C:\Users\user\Desktop\HfJLn9erXb.exe
          File Type:PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):16669
          Entropy (8bit):7.836876926418697
          Encrypted:false
          SSDEEP:384:dg1Ew+1FT+/6trrKWzge5jh2xmalhctpNy:W1E1c6tru1CUYa4tDy
          MD5:F80867A421C85C6E2865CF85FF7C4B02
          SHA1:C3EAB6B7E92646FE3407B2B3C5AFFE13A7873C48
          SHA-256:BCAA3B1333919176137D4DE4B1E3F31126159B12F959D7277BD8537B95139BD3
          SHA-512:06B51E660AEE86FC3BB068C6DEA046920E04F86B8EDD02E640EAC619F0F0D7E87E5CAE5BE1390CEBC5DFE70AA13BAB1710176E88C9D1C859182629D429745D78
          Malicious:false
          Preview:.PNG........IHDR...X...X......f......tEXtSoftware.Adobe ImageReadyq.e<..@.IDATx.....\.}..../...].{`.......D.\..u......#..V.eW.G>"W....V..d..IVU".:.D<$J.....{q/.....`0g./..z....A.`..?..p....M......._.'...L...]~.....;.........,..... ....X.....@`.. ..........@`...,..... ....X.....@`.. ..........@`...,..........X.....@`.. ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X...,..... ..........@`...,..........X...,..... ....~.....N...@...C{..o.?2.....x...?_....sC..O8...n..J.ttbv9...w~...ym..O.......vq"f..qrjt9... ..].S..Hz.gf}.,.Sm!...>..Xh..:S.};d.....2..?.......2...1..ep...K.{.?..@`.7=...7U..C......S...6....|a.}].._..d....,_.........+__..JS.....X.u...;..Q.x.z9...eP5f.H..nnz.&h...4.kz......&....o)..=..x.=...y ....6i...wL.....Y(.2NRP..J...HL/K#^izqpbUp}...q...g.......".....4R..#.VFrR|.LF>w~.Pm..\..4.5t{.-..
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.56953186638099
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:HfJLn9erXb.exe
          File size:335976
          MD5:049ecad4587538c292e3ebeee5947eb5
          SHA1:12aabeb19083dd114b7b94c836b031de3945d2c9
          SHA256:cf9a08d65a0b472b1ed84638a09d39d741f34e9cd2641092141a9bf1a5f796a6
          SHA512:12092128f6b2f6ea6ab86a7b1812e550e598dfecd43a240bd1ffc0bd15ff9c24e3c9bb40a4273ad706b9a7a7ad890b1c708c42cc23ec359626f5024b36db03ce
          SSDEEP:6144:DDk9dhfzelxllPuHBXZOEz5hN4EAnKQo4N7kqZ7t+roIbvS:U9u3lWHBXZTENnKza7kqZ5+rh6
          TLSH:7D6401913AE0D467FC5A4630CAA5E5F3D2A1FE04C916C18373647F6F7D322419922EBA
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...+.oZ.................`.........
          Icon Hash:08c2b0d8cc64b046
          Entrypoint:0x4031d6
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x5A6FED2B [Tue Jan 30 03:57:31 2018 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:3abe302b6d9a1256e6a915429af4ffd2
          Signature Valid:false
          Signature Issuer:E=Brooking183@Flydes25.Dyr, OU="Magtbalancerne Regnvejrsdagene Intensives ", O=Skizofren, L=Onalaska, S=Wisconsin, C=US
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 2/5/2023 12:25:21 AM 2/4/2026 12:25:21 AM
          Subject Chain
          • E=Brooking183@Flydes25.Dyr, OU="Magtbalancerne Regnvejrsdagene Intensives ", O=Skizofren, L=Onalaska, S=Wisconsin, C=US
          Version:3
          Thumbprint MD5:DE53E25C4A808A06A0CD944E65FB058D
          Thumbprint SHA-1:B1DD19494EAA53E29C92E68EB19E33CFABB34DE0
          Thumbprint SHA-256:12FF0462FE369CB81BB77B13ADFE3B705E7F71A5CFA614B370A8D6D63719C06F
          Serial:6CA44E753450CEC7C37D62FEA0B835456441D271
          Instruction
          sub esp, 00000184h
          push ebx
          push esi
          push edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [esp+18h], ebx
          mov dword ptr [esp+10h], 00409198h
          mov dword ptr [esp+20h], ebx
          mov byte ptr [esp+14h], 00000020h
          call dword ptr [004070A0h]
          call dword ptr [0040709Ch]
          and eax, BFFFFFFFh
          cmp ax, 00000006h
          mov dword ptr [0042370Ch], eax
          je 00007F6EB0CDF0F3h
          push ebx
          call 00007F6EB0CE21CAh
          cmp eax, ebx
          je 00007F6EB0CDF0E9h
          push 00000C00h
          call eax
          mov esi, 00407298h
          push esi
          call 00007F6EB0CE2146h
          push esi
          call dword ptr [00407098h]
          lea esi, dword ptr [esi+eax+01h]
          cmp byte ptr [esi], bl
          jne 00007F6EB0CDF0CDh
          push 0000000Ah
          call 00007F6EB0CE219Eh
          push 00000008h
          call 00007F6EB0CE2197h
          push 00000006h
          mov dword ptr [00423704h], eax
          call 00007F6EB0CE218Bh
          cmp eax, ebx
          je 00007F6EB0CDF0F1h
          push 0000001Eh
          call eax
          test eax, eax
          je 00007F6EB0CDF0E9h
          or byte ptr [0042370Fh], 00000040h
          push ebp
          call dword ptr [00407044h]
          push ebx
          call dword ptr [00407288h]
          mov dword ptr [004237D8h], eax
          push ebx
          lea eax, dword ptr [esp+38h]
          push 00000160h
          push eax
          push ebx
          push 0041ECC8h
          call dword ptr [00407178h]
          push 00409188h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000xa3c0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x516500xa18
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x5f0d0x6000False0.6649169921875data6.450520423955375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x70000x12480x1400False0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x90000x1a8180x400False0.6376953125data5.129587811765307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x240000x120000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x360000xa3c00xa400False0.0760766006097561data1.8822021165260459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_BITMAP0x362680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
          RT_ICON0x365d00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States
          RT_DIALOG0x3fa780x144dataEnglishUnited States
          RT_DIALOG0x3fbc00x13cdataEnglishUnited States
          RT_DIALOG0x3fd000x120dataEnglishUnited States
          RT_DIALOG0x3fe200x11cdataEnglishUnited States
          RT_DIALOG0x3ff400xc4dataEnglishUnited States
          RT_DIALOG0x400080x60dataEnglishUnited States
          RT_GROUP_ICON0x400680x14dataEnglishUnited States
          RT_MANIFEST0x400800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
          DLLImport
          KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
          No statistics
          Target ID:0
          Start time:20:29:34
          Start date:17/03/2023
          Path:C:\Users\user\Desktop\HfJLn9erXb.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\HfJLn9erXb.exe
          Imagebase:0x400000
          File size:335976 bytes
          MD5 hash:049ECAD4587538C292E3EBEEE5947EB5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.775983857.0000000003AEC000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          No disassembly