Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rAEAT-AvisodeNotificaci__n.exe

Overview

General Information

Sample Name:rAEAT-AvisodeNotificaci__n.exe
Analysis ID:830397
MD5:77b1761153f7e6ca4b76ea26c2fa6645
SHA1:be00353381302d16a62c114efa564acf60473368
SHA256:dbb02fdfea2855cb95d3a6a2668fd5392b9d997200277d98fb758db781880523
Infos:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
May check the online IP address of the machine
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Enables debug privileges
AV process strings found (often used to terminate AV products)
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • rAEAT-AvisodeNotificaci__n.exe (PID: 7928 cmdline: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe MD5: 77B1761153F7E6CA4B76EA26C2FA6645)
    • CasPol.exe (PID: 5816 cmdline: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 5796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • WerFault.exe (PID: 7128 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2552 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Betegner.ButJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.2396701126.0000000000F30000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      00000000.00000002.2031116791.00000000048C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000000.00000002.2031116791.00000000049EC000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          No Sigma rule has matched
          Timestamp:192.168.11.20132.226.8.16949797802039190 03/20/23-11:38:26.059783
          SID:2039190
          Source Port:49797
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: rAEAT-AvisodeNotificaci__n.exeVirustotal: Detection: 26%Perma Link
          Source: rAEAT-AvisodeNotificaci__n.exeReversingLabs: Detection: 25%
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.11.20:49795 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.184.193:443 -> 192.168.11.20:49796 version: TLS 1.2
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: @{n.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.ni.pdbRSDS source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: f4symbols\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: caspol.pdbcaspol.pdbpdbpol.pdb\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: C:\Windows\caspol.pdbpdbpol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdbb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: caspol.pdbR/ source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: ?{nC:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: 6HPon,C:\Windows\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdbc source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Windows.Forms.pdb4v?t4v?t source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Xml.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: ##.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Core.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: Microsoft.VisualBasic.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.pdbTLIs source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Windows.Forms.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: caspol.pdbloopback_0 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: mscorlib.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: caspol.pdb source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb0 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.PDB5 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb@ source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: wcaspol.PDB 8 source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00402862 FindFirstFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then jmp 348778CCh
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h

          Networking

          barindex
          Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.11.20:49797 -> 132.226.8.169:80
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727cbroendti715a9k7i4jfb9nau/1679308650000/13380849351983225481/*/1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4?e=download&uuid=a39e1756-09be-48bf-9f6c-3bbe22c32c5b HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-08-as-docs.googleusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
          Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: CasPol.exe, 00000005.00000002.2494898818.000000003497D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: CasPol.exe, 00000005.00000002.2494898818.000000003497D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2494898818.0000000034966000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: CasPol.exe, 00000005.00000002.2494898818.00000000348C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Attribution
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Distribution
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Notice
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
          Source: CasPol.exe, 00000005.00000003.2000934593.00000000040FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: CasPol.exe, 00000005.00000003.2000934593.00000000040FE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2476781418.000000000410B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
          Source: CasPol.exe, 00000005.00000002.2494898818.00000000348C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://subca.ocsp-certum.com01
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://subca.ocsp-certum.com02
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://subca.ocsp-certum.com05
          Source: Amcache.hve.LOG1.9.dr, Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
          Source: rAEAT-AvisodeNotificaci__n.exeString found in binary or memory: http://www.certum.pl/CPS0
          Source: CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-08-as-docs.googleusercontent.com/
          Source: CasPol.exe, 00000005.00000003.2000934593.00000000040FE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000003.2005562805.0000000004134000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-08-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727c
          Source: CasPol.exe, 00000005.00000002.2476781418.000000000406B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: CasPol.exe, 00000005.00000002.2476781418.000000000406B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2492021767.0000000033910000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4
          Source: CasPol.exe, 00000005.00000002.2476781418.000000000406B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4m
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2027970951.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2027970951.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtimeBSJB
          Source: unknownDNS traffic detected: queries for: drive.google.com
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727cbroendti715a9k7i4jfb9nau/1679308650000/13380849351983225481/*/1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4?e=download&uuid=a39e1756-09be-48bf-9f6c-3bbe22c32c5b HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-08-as-docs.googleusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.11.20:49795 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.184.193:443 -> 192.168.11.20:49796 version: TLS 1.2
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2552
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00404C3F
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C069F
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C089A
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0091
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C04B3
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C02C0
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C00D0
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C04EB
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C06E2
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C02FB
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0209
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0001
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0414
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0011
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0629
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0826
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C023F
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0444
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0053
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C066C
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0866
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C047D
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0279
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0986
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0196
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C07DE
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C05DF
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C03D9
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C01FD
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0517
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0117
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0727
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C033F
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0551
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0769
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C0377
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F302FB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F306E2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F304EB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F300D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F302C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F304B3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30091
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3089A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3069F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30279
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3047D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30866
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3066C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30053
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30444
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3023F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30826
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30629
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30011
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30414
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30001
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30209
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F301FD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F303D9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F305DF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F307DE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30196
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30986
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30377
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30769
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30551
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3033F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30727
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30517
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F30117
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_348734F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_34876DDF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_348720D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_34874858
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_348762EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_34876300
          Source: System.Reflection.TypeExtensions.dll.0.drStatic PE information: No import functions for PE file found
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeSection loaded: edgegdi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: invalid certificate
          Source: rAEAT-AvisodeNotificaci__n.exeVirustotal: Detection: 26%
          Source: rAEAT-AvisodeNotificaci__n.exeReversingLabs: Detection: 25%
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile read: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeJump to behavior
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2552
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile created: C:\Users\user\AppData\Local\Temp\nsu2A86.tmpJump to behavior
          Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@5/21@3/3
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_004020FE CoCreateInstance,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_004046C3 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5816
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5796:304:WilStaging_02
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5796:120:WilError_03
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: rAEAT-AvisodeNotificaci__n.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: @{n.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.ni.pdbRSDS source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: f4symbols\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: caspol.pdbcaspol.pdbpdbpol.pdb\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: C:\Windows\caspol.pdbpdbpol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdbb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: caspol.pdbR/ source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: ?{nC:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: 6HPon,C:\Windows\caspol.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdbc source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Windows.Forms.pdb4v?t4v?t source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Xml.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: ##.pdb source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Core.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: Microsoft.VisualBasic.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.pdbTLIs source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Windows.Forms.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: caspol.pdbloopback_0 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: mscorlib.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: caspol.pdb source: CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb0 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.PDB5 source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb@ source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: wcaspol.PDB 8 source: CasPol.exe, 00000005.00000002.2493152343.0000000034667000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WER3F32.tmp.dmp.9.dr
          Source: Binary string: \??\C:\Windows\exe\caspol.pdb source: CasPol.exe, 00000005.00000002.2497690963.0000000036968000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.2031116791.00000000049EC000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2396701126.0000000000F30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2031116791.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Betegner.But, type: DROPPED
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_10002DE0 push eax; ret
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C508C push bx; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C828D push BC5D77DBh; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C6497 push es; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C5AB1 push es; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C7AC5 push eax; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C50EC push bx; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C68E7 push es; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C50F5 push bx; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C6409 push es; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C81D4 push cs; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C81E3 push cs; retf
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C572D push ecx; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_048C8343 push 6F430E00h; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F350F5 push bx; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F368E7 push es; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F350EC push bx; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F37AC5 push eax; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F35AB1 push es; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F36497 push es; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3828D push BC5D77DBh; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3508C push bx; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F36409 push es; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F381E3 push cs; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F381D4 push cs; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F38343 push 6F430E00h; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_00F3572D push ecx; iretd
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: System.Reflection.Primitives.dll.0.drStatic PE information: 0xE40AD0DE [Wed Mar 28 09:54:38 2091 UTC]
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.Primitives.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile created: C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.TypeExtensions.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile created: C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\AdvSplash.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2029819324.0000000000B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE0^
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2029819324.0000000000B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.Primitives.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.TypeExtensions.dllJump to dropped file
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00402862 FindFirstFileW,
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeSystem information queried: ModuleInformation
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeAPI call chain: ExitProcess graph end node
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2029819324.0000000000B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe0^
          Source: CasPol.exe, 00000005.00000002.2476781418.000000000406B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@U
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWt`
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2083714063.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: rAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2029819324.0000000000B38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: CasPol.exe, 00000005.00000002.2479913570.0000000005A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00403D1B SetWindowPos,ShowWindow,DestroyWindow,SetWindowLongW,GetDlgItem,SendMessageW,IsWindowEnabled,LdrInitializeThunk,SendMessageW,GetDlgItem,GetDlgItem,GetDlgItem,SetClassLongW,SendMessageW,LdrInitializeThunk,GetDlgItem,ShowWindow,KiUserCallbackDispatcher,EnableWindow,GetSystemMenu,EnableMenuItem,SendMessageW,SendMessageW,SendMessageW,lstrlenW,SetWindowTextW,DestroyWindow,CreateDialogParamW,GetDlgItem,GetWindowRect,ScreenToClient,SetWindowPos,ShowWindow,DestroyWindow,EndDialog,ShowWindow,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: F30000
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.2107.4-0\msmpeng.exe
          Source: CasPol.exe, 00000005.00000002.2494898818.000000003497D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2494898818.00000000348C1000.00000004.00000800.00020000.00000000.sdmp, Amcache.hve.9.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          11
          Virtualization/Sandbox Evasion
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium11
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
          Process Injection
          1
          Disable or Modify Tools
          LSASS Memory11
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager1
          System Network Configuration Discovery
          SMB/Windows Admin Shares1
          Clipboard Data
          Automated Exfiltration2
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
          Process Injection
          NTDS2
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
          Obfuscated Files or Information
          LSA Secrets16
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Timestomp
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          rAEAT-AvisodeNotificaci__n.exe26%VirustotalBrowse
          rAEAT-AvisodeNotificaci__n.exe25%ReversingLabsWin32.Trojan.Generic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.Primitives.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Switchboards\Barnls\System.Reflection.TypeExtensions.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\AdvSplash.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsu2B23.tmp\System.dll0%ReversingLabs
          No Antivirus matches
          SourceDetectionScannerLabelLink
          checkip.dyndns.com0%VirustotalBrowse
          checkip.dyndns.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://checkip.dyndns.org/0%Avira URL Cloudsafe
          http://subca.ocsp-certum.com050%Avira URL Cloudsafe
          http://checkip.dyndns.org0%Avira URL Cloudsafe
          http://subca.ocsp-certum.com010%Avira URL Cloudsafe
          http://subca.ocsp-certum.com020%Avira URL Cloudsafe
          http://checkip.dyndns.org0%VirustotalBrowse
          http://checkip.dyndns.com0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          142.250.185.110
          truefalse
            high
            googlehosted.l.googleusercontent.com
            142.250.184.193
            truefalse
              high
              checkip.dyndns.com
              132.226.8.169
              truetrueunknown
              doc-08-as-docs.googleusercontent.com
              unknown
              unknownfalse
                high
                checkip.dyndns.org
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                https://doc-08-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727cbroendti715a9k7i4jfb9nau/1679308650000/13380849351983225481/*/1z2zMikfPb67TZJIo_lB5FRH6cO_UKsr4?e=download&uuid=a39e1756-09be-48bf-9f6c-3bbe22c32c5bfalse
                  high
                  http://checkip.dyndns.org/true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.certum.pl/ctsca2021.crl0orAEAT-AvisodeNotificaci__n.exefalse
                    high
                    http://repository.certum.pl/ctnca.cer09rAEAT-AvisodeNotificaci__n.exefalse
                      high
                      http://crl.certum.pl/ctnca.crl0krAEAT-AvisodeNotificaci__n.exefalse
                        high
                        https://doc-08-as-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/19pk727cCasPol.exe, 00000005.00000003.2000934593.00000000040FE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000003.2005562805.0000000004134000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2476781418.0000000004134000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://creativecommons.org/ns#ShareAlikebattery-level-90-charging-symbolic.svg.0.drfalse
                            high
                            http://upx.sf.netAmcache.hve.LOG1.9.dr, Amcache.hve.9.drfalse
                              high
                              http://checkip.dyndns.orgCasPol.exe, 00000005.00000002.2494898818.000000003497D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.2494898818.0000000034966000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://doc-08-as-docs.googleusercontent.com/CasPol.exe, 00000005.00000002.2476781418.00000000040C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorrAEAT-AvisodeNotificaci__n.exefalse
                                  high
                                  http://creativecommons.org/ns#battery-level-90-charging-symbolic.svg.0.drfalse
                                    high
                                    https://github.com/dotnet/runtimerAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2027970951.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drfalse
                                      high
                                      http://creativecommons.org/ns#DerivativeWorksbattery-level-90-charging-symbolic.svg.0.drfalse
                                        high
                                        http://creativecommons.org/licenses/by-sa/4.0/battery-level-90-charging-symbolic.svg.0.drfalse
                                          high
                                          http://creativecommons.org/ns#Distributionbattery-level-90-charging-symbolic.svg.0.drfalse
                                            high
                                            http://repository.certum.pl/ctsca2021.cer0rAEAT-AvisodeNotificaci__n.exefalse
                                              high
                                              http://subca.ocsp-certum.com05rAEAT-AvisodeNotificaci__n.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://drive.google.com/CasPol.exe, 00000005.00000002.2476781418.000000000406B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://creativecommons.org/ns#Attributionbattery-level-90-charging-symbolic.svg.0.drfalse
                                                  high
                                                  http://subca.ocsp-certum.com02rAEAT-AvisodeNotificaci__n.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://subca.ocsp-certum.com01rAEAT-AvisodeNotificaci__n.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crl.certum.pl/ctnca2.crl0lrAEAT-AvisodeNotificaci__n.exefalse
                                                    high
                                                    http://repository.certum.pl/ctnca2.cer09rAEAT-AvisodeNotificaci__n.exefalse
                                                      high
                                                      https://github.com/dotnet/runtimeBSJBrAEAT-AvisodeNotificaci__n.exe, 00000000.00000002.2027970951.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drfalse
                                                        high
                                                        http://checkip.dyndns.comCasPol.exe, 00000005.00000002.2494898818.000000003497D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://creativecommons.org/ns#Noticebattery-level-90-charging-symbolic.svg.0.drfalse
                                                          high
                                                          http://creativecommons.org/ns#Reproductionbattery-level-90-charging-symbolic.svg.0.drfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000005.00000002.2494898818.00000000348C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.certum.pl/CPS0rAEAT-AvisodeNotificaci__n.exefalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                132.226.8.169
                                                                checkip.dyndns.comUnited States
                                                                16989UTMEMUStrue
                                                                142.250.184.193
                                                                googlehosted.l.googleusercontent.comUnited States
                                                                15169GOOGLEUSfalse
                                                                142.250.185.110
                                                                drive.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                Joe Sandbox Version:37.0.0 Beryl
                                                                Analysis ID:830397
                                                                Start date and time:2023-03-20 11:35:27 +01:00
                                                                Joe Sandbox Product:CloudBasic
                                                                Overall analysis duration:0h 15m 31s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:light
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                                Number of analysed new started processes analysed:17
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • HDC enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample file name:rAEAT-AvisodeNotificaci__n.exe
                                                                Detection:MAL
                                                                Classification:mal92.troj.spyw.evad.winEXE@5/21@3/3
                                                                EGA Information:
                                                                • Successful, ratio: 50%
                                                                HDC Information:
                                                                • Successful, ratio: 29% (good quality ratio 28.3%)
                                                                • Quality average: 88%
                                                                • Quality standard deviation: 22.1%
                                                                HCA Information:
                                                                • Successful, ratio: 89%
                                                                • Number of executed functions: 0
                                                                • Number of non-executed functions: 0
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, WerFault.exe, UserOOBEBroker.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe
                                                                • TCP Packets have been reduced to 100
                                                                • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                                • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, umwatson.events.data.microsoft.com, wdcp.microsoft.com
                                                                • Execution Graph export aborted for target CasPol.exe, PID 5816 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                No simulations
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):1.2402537125969615
                                                                Encrypted:false
                                                                SSDEEP:192:VMqd9vIxWmBUWSaX+AMWVM+Du76vfAIO8h:vnI5BUWSaOaq+Du76vfAIO8h
                                                                MD5:ED680D8D31F3FD082DCB77CF6EAE07E1
                                                                SHA1:878F217646AB6F4649CE1CA8931C2A3EB35F5393
                                                                SHA-256:5F789CCB151E1D25AFB76A85FCADDBBFA6EF7CE61044F25C05687DB400312523
                                                                SHA-512:FC3A12027BAF17535ABDD7D4842B05196257AF77465EF3868247B677D7D87CB599CDA8647B57EA4658183E3B8198C552C345948EE8D317389DEF6A2E9F93F20A
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.3.7.8.5.9.1.0.9.5.9.3.6.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.3.7.8.5.9.1.1.7.5.6.0.5.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.d.e.7.5.d.d.-.c.a.8.c.-.4.b.4.0.-.8.9.3.f.-.3.6.d.d.d.5.1.5.d.b.d.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.8.5.9.7.d.f.-.7.4.e.a.-.4.6.d.7.-.b.6.3.e.-.b.c.9.f.6.4.8.4.2.e.9.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.c.a.s.p.o.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.c.a.s.p.o.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.b.8.-.0.0.0.1.-.0.0.1.5.-.6.a.2.6.-.e.1.7.6.2.0.5.b.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.c.6.8.c.a.3.f.0.1.3.c.4.9.0.1.6.1.c.0.1.5.6.e.f.3.5.9.a.f.0.3.5.9.4.a.e.5.e.2.!.C.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 20 11:38:31 2023, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):295522
                                                                Entropy (8bit):3.596920993962001
                                                                Encrypted:false
                                                                SSDEEP:3072:cgHI52q0a/2Ljp/oy7ppf4uEqVsLTgtUBLnF:cgo52qn/Miy7pV41TgtU
                                                                MD5:1307F65F3C6CBD8BC7DF63E7CEF9714A
                                                                SHA1:E6F931110CB86AE00F0461CE761970EB50695AE9
                                                                SHA-256:6F1B13539C7BFD4C7EFE04C03DA6767AD5963B868F80CB1B1C709ABAE0044CFF
                                                                SHA-512:D3430BE583A87BF2E3C2AEBA0B075762DAD1C7C174DDB21BBA4AD87DC30FCA50487CEB63B6DA1F47C9FD10B9FFA87417161836A142EBE4F7EC7E2B4E96700A70
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MDMP..a..... ........E.d.........................#..........T"..,c..........T.......8...........T........... c..B............,..........................................................................................bJ......8/......GenuineIntel...........T............E.d.............................0..................G.M.T. .S.t.a.n.d.a.r.d. .T.i.m.e...................................................G.M.T. .D.a.y.l.i.g.h.t. .T.i.m.e...................................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):8464
                                                                Entropy (8bit):3.702193266151724
                                                                Encrypted:false
                                                                SSDEEP:192:R9l7lZNipzj6I62a6Y156/6gmfZCCCLFpr789b5gsfYTm:R9lnNitj6I6b6Y76CgmfhL5zfx
                                                                MD5:60563EF0E3B4B1A13813CB462B103B4A
                                                                SHA1:1F93939309371B7989DC47528DFC3FB6EF704C12
                                                                SHA-256:21A67973FA6ABDC6260575BECB028BAF5B6C77C467188F86F897A1134EEC6A14
                                                                SHA-512:EDEED8E06EE5CA70683A3F77880522CA6F03D1C40FA52E72C184B8D677C0AD331D9BE1B03CB7BB42C83EB28D7FE35BF2E68A3BB092C3731F2966A24F5910AFE4
                                                                Malicious:false
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.1.6.<./.P.i.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4926
                                                                Entropy (8bit):4.518247674827522
                                                                Encrypted:false
                                                                SSDEEP:48:cvIwwtl8zsqe702I7VFJ5WS2CfjkBns3rm8M4JdyFA+q8vrsOvkVd:uILfP7GySPf9JBKvvkVd
                                                                MD5:C8D911DB5AA6437AD975FB5BA0A1FD08
                                                                SHA1:9B23854B43096642E7851310D38AB5A38D5A5B7D
                                                                SHA-256:A652CFDD2AEA561BC70ADFA093D4E4D4307FC04DD3D3E5D9EE81CFE8DC7BC7F0
                                                                SHA-512:E454D111FCBA42B7635940A1280A60D6B70EDB74405DBFC14AD3125F9CE2F586DCA5D01770437991A6A98E6B86637720ED4FDF43331D2C3FCC0DE4C7A472D9CD
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222060380" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):227
                                                                Entropy (8bit):6.604776901672149
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPysE9Xj1F/bkqdXujFErL4MImATQZu22F+p:6v/7kR7/bjd8Kgm2Q/2y
                                                                MD5:7843C38CC42C6786B3373F166AF10172
                                                                SHA1:BA0163109D9B641B1312230B3F62E1E10A61AA5E
                                                                SHA-256:E3AF1293F8E8AB5C81300196AF55A7C15D5608291D46A2B86D4255910A7D0E59
                                                                SHA-512:B1D3DF6A0A8CACD729CD9A2FD5AB0F74ED611270FA172CDBEB13D46FA71DD5CC5540A2FBFDB6C3004E652D317C8FAD4EC3AE437DF1C082B629870A33CC6BD34F
                                                                Malicious:false
                                                                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1..P......#.bae....^.^K/fek+........X...........gfw....\.D/..b...a.4..$........H#....o8...}..6.K.....Xc.$ ..'.1.2..vu.../O..>V......CD....<....w........IEND.B`.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):219901
                                                                Entropy (8bit):7.346720674827732
                                                                Encrypted:false
                                                                SSDEEP:3072:Pcm5+sib8rmT/zvMEV7N+9Cxn1UAPWY+X2g6g6yc3b6Gr07B1i:Pcm5+KrCbUEpNmC11UAPo9Eb6Gr0VA
                                                                MD5:513144AEAF00A1862C312A14C5845328
                                                                SHA1:4EE06E09FF90E24E6D8A61B98D86744E4A450913
                                                                SHA-256:32483AC943D45F79D021312D39A11BB03B39103D475327A8C52B7F622EA837C4
                                                                SHA-512:3935E898FCC0880164CD7A72495EE7BFF53BCC28E8A955AFB2123CA6C0B0298BF68CE25BC66B53A434D474ABC8130FD702D0BEB5614857BA0A89DFEF8D344B84
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Betegner.But, Author: Joe Security
                                                                Preview:.FFFF...v...M....T........s......777..rr..o.............11.q.............................$$$..........L...jj........... .........v.ll.............FFF...........vv..................+......................@.zz...................H...LL..hh....d..WW...................f..ss...##........................t.....&........................L..........q.........U................ll....q..3.O........(.....~..||.8..a...........XX.............S................<....tt.................%%.......q.%............................mmm........ttttt..........DD..ppppp.**...."...b..<.JJ.PPP........N.........................rrr.DD..............T........~.............bbb.......x.{...............hhh....tt.............)....................'......p.....====...44.....nnnnn....n...2.MM.........^...x................//........C..........l............}....`.........QQQ...D....t...................|...............22...........'................................O.........\......p.SS.....................k..T...............eee...".
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:SVG Scalable Vector Graphics image
                                                                Category:dropped
                                                                Size (bytes):6689
                                                                Entropy (8bit):5.135211840989561
                                                                Encrypted:false
                                                                SSDEEP:192:VkjcMIy2+X2I2F2C2G2fH7y8cQaVB2nnuy1FQOcQaVv2q22L2k2s:mjcM7u8xaV8nnL1FQOxaVu6
                                                                MD5:C96D0DD361AFC6B812BDDD390B765A26
                                                                SHA1:71081F096719CAA70B9BAEF86FE642635D8E2765
                                                                SHA-256:6690799E5FA3FB0DD6CCE4BAC5AA1607C8A6BB16507854A87520C7DE53052E1B
                                                                SHA-512:7C73BC880A9401C64AB0571957B414180C1B94137C7BC870BA602979E7A990640A37991CB87A40BC7E5942A37FDA25EFC58C759C00F4344BA3D88B9AA64182DA
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000036">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):225
                                                                Entropy (8bit):6.596645802250635
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPysi5NuhsPwRngRfPq/3+phjSfVsup:6v/7thstJACSNsc
                                                                MD5:F894266AB6A933B2FDA751E6490C319A
                                                                SHA1:2D2D3635198FEEFCB64D1D6B3CDCCDC4EA3DF4B0
                                                                SHA-256:95F533585B4C61936C369557B3B7E397E56545A4C9DB9A5BDDD0E9ABB7A7F7E7
                                                                SHA-512:977ED04753C3CB2B883D03A2A55001F6FCC8617DC3060B6C25AB7E5C691C3F76049E7DEADC7F6567AB7E8DC8492DE2874E8E632CF3EAD7B39ABC8CC98D331442
                                                                Malicious:false
                                                                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..@.E...".u.`..#.v.,r.[..1$..]B.@6.,,.e.....fwg...._)9........y..[n...t.$g..:...P....@k.q......W.. .PY.$z..x....t..(-~!.0$:P.t......`.......Ba..Y.....IEND.B`.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):263
                                                                Entropy (8bit):6.731374842054556
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPysw9TXm0RZC/8xhbPgfdSwj4vw29OjuAO4+ZvYNVp:6v/7QVXm0a/8xhbPgfdSBvNYn2ZvYd
                                                                MD5:003B524806C1CA654CAC6ED2EB883E1B
                                                                SHA1:F6F6ACA125DC4DB3B33378404017B5EE7D21D334
                                                                SHA-256:2899E53769FA741E2C0675A2C69D2C246A8F34601BEE58DD66B16261005962A9
                                                                SHA-512:AA905997F9CE39F039E33C4CCA167C0137775D91B4929D918528BA00B92737C448EC46D91A4221644CCC00D1FCAA403AFF83F07276BAB6FD80D4B9E88E652F87
                                                                Malicious:false
                                                                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...K..1.D......g.e=.x......[]....Y$J'..`.@.S)R.4.q.D.K....x..%..0>~.;}..^.X....Lt.f!..K.....D.&,.7,..BM..t@..}N..o.?.....Hv.J...(..r.. ..)L....&..dT<..1y...X..X...............q...p..p.....IEND.B`.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):337
                                                                Entropy (8bit):7.143668471552015
                                                                Encrypted:false
                                                                SSDEEP:6:6v/lhPWFmX9Ckymx8BZhCjO5QO6MsHqd+K/eBDQeU2oG9xqgjp:6v/7K0omx8yOqVtHH1U2oGR
                                                                MD5:7FBFE5B0A7AD2A67AACFD8481F8DCA01
                                                                SHA1:21BABB6B7EC4746835DB43DC6A69A4AF0EFECA2D
                                                                SHA-256:0B4CD789E087F712F131FACCD754DC461774498DF3CA19B346D461D18A0AE622
                                                                SHA-512:3A8F0D9653301F789A0588E848C40FFC92394461BF70A3421ABC85647F2C115948134FE9E161D055A11D200536356A15677D9C0E645346D27E122001F67FE22B
                                                                Malicious:false
                                                                Preview:.PNG........IHDR................a....IDATx..S.r.P..=7.cw.....W.m...=......V....I...K.?#@D.0G......R.rF..^$....p..b..f.<.T.z......... +..3#.v.K...$....pT.j.....[.......r..p....O.2.Y.T.,......==...9{/...T./....Qa...3%....5...xmkI.7.1..P,g.%y..J..#^.e..I(.%jzI..#../..49...*..?#..I. =~..E.,MN@........`...../...=.-...1....IEND.B`.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:ASCII text, with very long lines (42980), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):42980
                                                                Entropy (8bit):2.6491437374043274
                                                                Encrypted:false
                                                                SSDEEP:768:KKarEEEJuib+7F22Ecarbbywoo4JaAgYqPfNsYEYp8ZTrVW8cZdUofY/xHXDABh2:psbRuyPjmtEQdsBEBhMX
                                                                MD5:6A34939EF0C3ABACF5534BBDB1BB40F0
                                                                SHA1:3752964E0E0A0552427FE4F9269286CC77A8582C
                                                                SHA-256:8689CF2163F824CDEE10C5FE950A2119050D389348D8FC80E424CCE57EC1CE33
                                                                SHA-512:49510854911026B1BBA9A038FF2D06CE5CB9860662ED6D597AF9664A1F48A5D39602E26240639CA1EBA6003B03E5C6ECAB06BFB4B67C1CA437A57BCAB1ECBE62
                                                                Malicious:false
                                                                Preview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
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):14952
                                                                Entropy (8bit):6.599053939997928
                                                                Encrypted:false
                                                                SSDEEP:192:mrlnC6xxk2R5Ws+Wql73WOL8/pCuPHnhWgN7aoWTF6lI+XqnajlkEv:6nbW2R5Ws+Wql7//uPHRN7SIImlqW
                                                                MD5:EDA04E04EBC0EBF7F8BBF30C4DAE6DE3
                                                                SHA1:7BC4D50E6EEC7F04A9272BFEE4E4DB6F278DBE63
                                                                SHA-256:F3E55CB3ADFA93F563B09114D93062E680AB0864C220491458FBE151798B862F
                                                                SHA-512:7027DA3404675596B71394B660E600DA12C0750895F624776362167869760555EE9990699FFC9E4407301FC9437B2F638E2734B8BDEF3C7054990FD5A9C86550
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."!..0.............^+... ........@.. ....................................`..................................+..K....@..................h$...`......T*..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@+......H........ ......................P ......................................H>.s..X.\...3V...?G../..3q..l.L.....qKy6b..u"HO...JmYQ.....J..,.*S..".R..=1RY.....\?.&dM........@'J.j.:.'.A.../..........I.BSJB............v4.0.30319......`.......#~..........#Strings............#GUID...........#Blob......................3......................................3.........@...........Y...................`.................g...?.g.....g...y.g.....g.....g.....g...`.g...m.g.................
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):32368
                                                                Entropy (8bit):6.393948275188786
                                                                Encrypted:false
                                                                SSDEEP:384:yWweWqlXnYcLpSfX0lawccfNXLWrdzy+A2jc2EPLNtAf/uPHRN7AJ/AlGseC62c:EqlXYcgEAwcc17Wc+bj+PLHuMU/xjx2c
                                                                MD5:F2A123183E106BB1CF19376A8079D171
                                                                SHA1:2B96296BE92D5F2EF7C59A70858AF4CAABC99A9D
                                                                SHA-256:896D4ED138C35ECF19AE432380096562872EAB103F7E352C15D214FD875B337A
                                                                SHA-512:FCA6A89EFB16780A06CD25A55638882970F03E1535180A0E463AF9794184B04EB345CF29B12D4F261094E04A584E9225A7AD36A62631227451059F64A77B3C67
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....[............" .....P................................................................`...@......@............... ......................................<........Z..p$...p..........T...............................................................H............text....N.......P.................. ..`.data........`.......R..............@....reloc.......p.......X..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...Z.!...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.e.f.l.e.c.t.i.o.n...T.y.p.e.E.x.t.e.n.s.i.o.n.s.....L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...j.!...F.i.l.e.D.e.s.c.r.i.p.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:SVG Scalable Vector Graphics image
                                                                Category:dropped
                                                                Size (bytes):1329
                                                                Entropy (8bit):4.950241534342892
                                                                Encrypted:false
                                                                SSDEEP:24:t4Cp/YHyKbRAecFxVrGDT/Gfd8hTdyKbRAecFxVrGDT/bNxNxZrGQ:9YHNtAecFmDT/s8hdNtAecFmDT/j3YQ
                                                                MD5:021A9F00A28C9D496E490AE951E8EF12
                                                                SHA1:F8A6392065D07BAC72E138B0E47A24FFDCCEE74B
                                                                SHA-256:B420561770B77FCB47F69B6198B34B11155535F8A2E907BC4A0998CE74AFD340
                                                                SHA-512:7F4F2D904EA968BF68E35E0D7F1EAE9718234757D1989879996BFB49D9C447F67544CB0E1C441FD6539D58B5F2C6ACA7E9E0208738C235D9AF0C093511760212
                                                                Malicious:false
                                                                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M1.018 7v2H14V7z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M11.99 4.99a1 1 0 00-.697 1.717L12.586 8l-1.293 1.293a1 1 0 101.414 1.414L15.414 8l-2.707-2.707a1 1 0 00-.717-.303z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decorati
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:SVG Scalable Vector Graphics image
                                                                Category:dropped
                                                                Size (bytes):1155
                                                                Entropy (8bit):5.154592341044034
                                                                Encrypted:false
                                                                SSDEEP:24:t4CpQyhEXQDWu4AeWrGMyRQJaPahrGDfJcghSvOqlIQX6e4AeWrGMyp:vhjDWu4Ae3M5wSgDDontqe4Ae3MO
                                                                MD5:EFB3C780BC44B346B50B1F0DC6CF6D0F
                                                                SHA1:472B0EDD1C4C3092BC7C4DF934ABE126885B1780
                                                                SHA-256:990859D3B2C830E23EC276BF1D38A38EE1BA3D89BF04CB138107E4CDE31167B5
                                                                SHA-512:5B9C96F146C6A065C89172D02BDE8020876DC9C78859AD2B8B9529C615215F88BA85C2789544F5C5A247C148BB52FE4B5FCA325E7EAC4826D31A0365A0B8BCBE
                                                                Malicious:false
                                                                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M5 7c-.31 0-.615.09-.812.281L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12H9s1 0 1-1c0 0 0-1-1-1H4.375l1.219-1.281C5.776 8.529 6 8.257 6 8V7z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M11 11h1.375l1.125 1.094L14.594 11H16v1.469l-1.094 1.062L16 14.594V16h-1.438L13.5 14.937 12.437 16H11v-1.406l1.063-1.063L11 12.47z" style="marker:none" color="#bebebe" overflow="visible"/><path d="M11 9c.31 0 .615-.09.813-.281L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1h-1v1c0 .257.13.529.313.719L11.593 4H7c-.528-.007-1 .472-1 1s.472 1.007 1 1h4.625l-1.219 1.281c-.182.19-.406.462-.406.719v1z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:star
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):891
                                                                Entropy (8bit):7.745720384539504
                                                                Encrypted:false
                                                                SSDEEP:24:d4qWCHdkXfUZEcO5MkIi416cOQSkye9V+:d4qnHd8MkIi4Dpb6
                                                                MD5:5AF147D26AD399F83825377F04FD56A1
                                                                SHA1:B378A498B0DB8114C794E21D533E80CEBE5DDE04
                                                                SHA-256:6147A091847FCC9D9EDB22E655C4FC9DE6632C76D4252350400FA286F9791109
                                                                SHA-512:EEC16DE49A4698FE4F03F841FBCF045FBBDC9D634EB73ED35DB544B6DB4BC0135CD8E1DF102FD1E8BDE9FC75380948B4C0459685EE2C21858D645B7973759EA6
                                                                Malicious:false
                                                                Preview:.PNG........IHDR................a...BIDATx.m.S.%9...$U.Fkl.y].m.6.m.F..5*g;k}.........P......~u................M......M.q......|OM>....:?>.X7.U..j.v..?...e....>.Jk.&.{.[=......t.d.....4.D...V....b..s.L.....Jg,..=V..@.n......Rqv...._....B.h.;l....A....r.ap....N...1./.O.2.u7#..../.....o..*..O...[..X,<. .....@v........t...H..Rf..C?q..8.HB.!{K..N.....t..5..1d.+......).......pL.5.R..=....jC"....t6.BA.)....xZ..d..^W~yU...ya......U/...VA.r.....r.U....[".D.).8..iO<..[.....t.e9S...K8!....K..&p..Y2l.....".P8:..v..0....zd..''....O?+^.. =..b....t..K../.......?.?5...c.[.f.nP.P.o....7..k..t.?P(..O>.H~...n..jh.'..]..SC.5M.....'.}.n..'...t..9..c*...Ki...t..1z..N.q...w.w..y..W...K7x.^..p....j...%..3.|.....x...G.|~..a.o.N.<.......wK...]..u..........`...(z.B!.?q.b..u..$(.#1..N...b.u...@h...|.w..g....}i....?~......1~...l..]h......IEND.B`.
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):6144
                                                                Entropy (8bit):4.496995234059773
                                                                Encrypted:false
                                                                SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                                                                MD5:E8B67A37FB41D54A7EDA453309D45D97
                                                                SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                                                                SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                                                                SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):11776
                                                                Entropy (8bit):5.659384359264642
                                                                Encrypted:false
                                                                SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                                                                MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                                                                SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                                                                SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                                                                SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                Category:dropped
                                                                Size (bytes):2097152
                                                                Entropy (8bit):4.512546218889307
                                                                Encrypted:false
                                                                SSDEEP:12288:dgcUY6/eee9WwB84iTd+vXlnFbSwv+JnxQ7SLj732JlCGzz4OragmcnYJe:dX9WwB84iTd+vXlnFGMB4OragmcnYJe
                                                                MD5:5BF4985CB57212B68B3FA93CA480E32F
                                                                SHA1:8CA2702D7B46279BFB6121103417834EE80EDC49
                                                                SHA-256:8CB558ADE731A28AD742FDA983024154BF8C1306834281080F7A6D2C6DDDA870
                                                                SHA-512:095C6429C8DB088FAE11A782D4684A2C7427268628A79EEC5A7B97DC7E7A835243D5B66576F03DB1BAB683D57F9D64AA144EFA4E906E2FA93685CBAED01B910C
                                                                Malicious:false
                                                                Preview:regf........5.#.^................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm.K>. [.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                Category:dropped
                                                                Size (bytes):376832
                                                                Entropy (8bit):2.6699994316731033
                                                                Encrypted:false
                                                                SSDEEP:3072:US3DFIecejetbNqlWjai5sTBG29DgebeOeF8DgebeOeDe3TKeme:UYSJexP9c6ns8c6nie3TKz
                                                                MD5:5945EC104B18442693FC321D2FA8C8F5
                                                                SHA1:EE860927007D959734CF2BC6D8D767B621A0617B
                                                                SHA-256:FAE5071F7F6B1012397D1BA745DE7F3523CCC8A978F5AB7804B138E4385AA7DC
                                                                SHA-512:C7E46E8BB1E5902FF36F9E504C82CF71944E9A346A522E9D0EC59B543DB77B49D55141F564926A23068FC36BD627BE8E2FD7DCFEE7E37C8D9E672C58230F8F27
                                                                Malicious:false
                                                                Preview:regf........5.#.^................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm.K>. [.................................................................................................................................................................................................................................................................................................................................................HvLE.....................P.$s...6$ z...................`....................... ... ...`... ..hbin................5.#.^...........nk,....S...............................................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......nk ..."..(......(...........@...............................*...N.......)...InventoryMiscellaneousMemorySlotArrayInfo....................mG.....nk .$4./T....... ...................................Z.......................Root........lh..
                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                File Type:ISO-8859 text, with CRLF, LF line terminators
                                                                Category:dropped
                                                                Size (bytes):211
                                                                Entropy (8bit):4.572499124765754
                                                                Encrypted:false
                                                                SSDEEP:6:WsTbRh07NkMswksKML4IOBWEyIFrvaawp0N5aNlc:DYsDh06ep650c
                                                                MD5:CBFCB802B320CCF52613522DFB771EB4
                                                                SHA1:FEFC7681A1EF0B39C3AFF1BFDFB703D3C27689D3
                                                                SHA-256:AC2C2635F85C4D84C7EB1D72E0C6B347D82CFA78EE9506FEE8D17E0E6AA071C4
                                                                SHA-512:540854E486C2F9C3AAF97F5FD230CF9A76570D92B556CFD241728484103D9E24037CF2535F9AA0D2B799D994C97B8137776DBFC096CE39D5A68FF4CED414688A
                                                                Malicious:false
                                                                Preview:.Unhandled Exception: System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other memory is corrupt... at ?????.???Z?.?????().. at l.lW-.j????.Main().
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Entropy (8bit):7.030340339436893
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:rAEAT-AvisodeNotificaci__n.exe
                                                                File size:433208
                                                                MD5:77b1761153f7e6ca4b76ea26c2fa6645
                                                                SHA1:be00353381302d16a62c114efa564acf60473368
                                                                SHA256:dbb02fdfea2855cb95d3a6a2668fd5392b9d997200277d98fb758db781880523
                                                                SHA512:7ecfd1739db4ae8323896fa7c3e7231ef8124de59e7113eaffaf9ced0d93c07e3d5c48f50fa5cf1aed4588d4b5f35a35b5ea4221fd63b1c61a9f5e2207e03fe3
                                                                SSDEEP:6144:D6bAcJvkzKmPPzS58G93IuZUU/rR83tWgn2BRH81SH5ioFrI70U5p72l:87ubCHIC5rRKsg2BRc1cZs5p7u
                                                                TLSH:C194F1127FDBE867D0526D786186DE186EB0EF049219E747E3B03ABDE5BA3025C1B103
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                                                                Icon Hash:20c4f8f8e8f0f24c
                                                                Entrypoint:0x403350
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                                Signature Valid:false
                                                                Signature Issuer:E=Aktivsiden@Krselstider.Th, OU="Positival Kontaktpersonernes Frothi ", O=Overbegavet, L=Charmont-sous-Barbuise, S=Grand Est, C=FR
                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                Error Number:-2146762487
                                                                Not Before, Not After
                                                                • 12/07/2022 07:12:58 11/07/2025 07:12:58
                                                                Subject Chain
                                                                • E=Aktivsiden@Krselstider.Th, OU="Positival Kontaktpersonernes Frothi ", O=Overbegavet, L=Charmont-sous-Barbuise, S=Grand Est, C=FR
                                                                Version:3
                                                                Thumbprint MD5:2456D98150D883C67DE9DFE914FCE355
                                                                Thumbprint SHA-1:679C31D66A1EC517454AC9E145276BFB7CD9E1E1
                                                                Thumbprint SHA-256:841BEC78FA2D17EC15423A3044CCEC68C10A9C902E0F41BF269F4538B2CB4380
                                                                Serial:537EA62409F213AF08512C7B9AF6C6FDFE1BAEFB
                                                                Instruction
                                                                sub esp, 000002D4h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                push 00000020h
                                                                pop edi
                                                                xor ebx, ebx
                                                                push 00008001h
                                                                mov dword ptr [esp+14h], ebx
                                                                mov dword ptr [esp+10h], 0040A2E0h
                                                                mov dword ptr [esp+1Ch], ebx
                                                                call dword ptr [004080A8h]
                                                                call dword ptr [004080A4h]
                                                                and eax, BFFFFFFFh
                                                                cmp ax, 00000006h
                                                                mov dword ptr [007A8A2Ch], eax
                                                                je 00007F3380434753h
                                                                push ebx
                                                                call 00007F33804379E9h
                                                                cmp eax, ebx
                                                                je 00007F3380434749h
                                                                push 00000C00h
                                                                call eax
                                                                mov esi, 004082B0h
                                                                push esi
                                                                call 00007F3380437963h
                                                                push esi
                                                                call dword ptr [00408150h]
                                                                lea esi, dword ptr [esi+eax+01h]
                                                                cmp byte ptr [esi], 00000000h
                                                                jne 00007F338043472Ch
                                                                push 0000000Ah
                                                                call 00007F33804379BCh
                                                                push 00000008h
                                                                call 00007F33804379B5h
                                                                push 00000006h
                                                                mov dword ptr [007A8A24h], eax
                                                                call 00007F33804379A9h
                                                                cmp eax, ebx
                                                                je 00007F3380434751h
                                                                push 0000001Eh
                                                                call eax
                                                                test eax, eax
                                                                je 00007F3380434749h
                                                                or byte ptr [007A8A2Fh], 00000040h
                                                                push ebp
                                                                call dword ptr [00408044h]
                                                                push ebx
                                                                call dword ptr [004082A0h]
                                                                mov dword ptr [007A8AF8h], eax
                                                                push ebx
                                                                lea eax, dword ptr [esp+34h]
                                                                push 000002B4h
                                                                push eax
                                                                push ebx
                                                                push 0079FEE0h
                                                                call dword ptr [00408188h]
                                                                push 0040A2C8h
                                                                Programming Language:
                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x28268.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x679d00x2268.data
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .ndata0x3a90000x270000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x3d00000x282680x28400False0.3355129076086957data4.767250735975199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountry
                                                                RT_ICON0x3d03100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                                                RT_ICON0x3e0b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                                                                RT_ICON0x3e9fe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                                                                RT_ICON0x3ef4680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                                                RT_ICON0x3f36900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                                                RT_ICON0x3f5c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                                                RT_ICON0x3f6ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                                                                RT_ICON0x3f76680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                                                RT_DIALOG0x3f7ad00x100dataEnglishUnited States
                                                                RT_DIALOG0x3f7bd00xf8dataEnglishUnited States
                                                                RT_DIALOG0x3f7cc80xa0dataEnglishUnited States
                                                                RT_DIALOG0x3f7d680x60dataEnglishUnited States
                                                                RT_GROUP_ICON0x3f7dc80x76dataEnglishUnited States
                                                                RT_MANIFEST0x3f7e400x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States
                                                                DLLImport
                                                                KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                192.168.11.20132.226.8.16949797802039190 03/20/23-11:38:26.059783TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4979780192.168.11.20132.226.8.169
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Mar 20, 2023 11:38:23.851558924 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.851653099 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.851912022 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.875530005 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.875575066 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.916757107 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.916984081 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.917043924 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.917649031 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.917861938 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.981728077 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.981839895 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.982880116 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:23.983022928 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:23.986423969 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:24.028503895 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:24.329618931 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:24.329839945 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:24.329926968 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:24.329969883 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:24.330066919 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:24.330154896 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:24.331521988 CET49795443192.168.11.20142.250.185.110
                                                                Mar 20, 2023 11:38:24.331600904 CET44349795142.250.185.110192.168.11.20
                                                                Mar 20, 2023 11:38:24.442899942 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.443048000 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.443356991 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.443624020 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.443665981 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.509440899 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.509727001 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.511383057 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.511639118 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.514813900 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.514857054 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.515402079 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.515535116 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.515832901 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.556492090 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.762135029 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.762311935 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.762363911 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.762372017 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.762471914 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.763184071 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.763345957 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.763345957 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.764550924 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.764738083 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.764857054 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.765422106 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.765543938 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.765659094 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.765669107 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.765856981 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.767509937 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.767702103 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.767710924 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.767844915 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.770335913 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.770509958 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.770545959 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.770695925 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.770709038 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.770914078 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.771270990 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.771672010 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.771682024 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.771964073 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.771974087 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.772173882 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.772182941 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.772447109 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.772749901 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.773035049 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.773046970 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.773206949 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.773458958 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.773623943 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.773633003 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.773828030 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.774261951 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.774410009 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.774425030 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.774560928 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.774924994 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.775063038 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.775074959 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.775348902 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.775548935 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.775716066 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.775724888 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.775963068 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.776206017 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.776273966 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.776592016 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.776599884 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.777005911 CET49796443192.168.11.20142.250.184.193
                                                                Mar 20, 2023 11:38:24.777059078 CET44349796142.250.184.193192.168.11.20
                                                                Mar 20, 2023 11:38:24.777121067 CET44349796142.250.184.193192.168.11.20
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Mar 20, 2023 11:38:23.833991051 CET5606453192.168.11.201.1.1.1
                                                                Mar 20, 2023 11:38:23.843310118 CET53560641.1.1.1192.168.11.20
                                                                Mar 20, 2023 11:38:24.408962011 CET6288253192.168.11.201.1.1.1
                                                                Mar 20, 2023 11:38:24.441703081 CET53628821.1.1.1192.168.11.20
                                                                Mar 20, 2023 11:38:25.747843027 CET5705653192.168.11.201.1.1.1
                                                                Mar 20, 2023 11:38:25.758192062 CET53570561.1.1.1192.168.11.20
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Mar 20, 2023 11:38:23.833991051 CET192.168.11.201.1.1.10xeecdStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:24.408962011 CET192.168.11.201.1.1.10x7425Standard query (0)doc-08-as-docs.googleusercontent.comA (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.747843027 CET192.168.11.201.1.1.10xb072Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Mar 20, 2023 11:38:23.843310118 CET1.1.1.1192.168.11.200xeecdNo error (0)drive.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:24.441703081 CET1.1.1.1192.168.11.200x7425No error (0)doc-08-as-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                                                                Mar 20, 2023 11:38:24.441703081 CET1.1.1.1192.168.11.200x7425No error (0)googlehosted.l.googleusercontent.com142.250.184.193A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                Mar 20, 2023 11:38:25.758192062 CET1.1.1.1192.168.11.200xb072No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                • drive.google.com
                                                                • doc-08-as-docs.googleusercontent.com
                                                                • checkip.dyndns.org

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:11:37:20
                                                                Start date:20/03/2023
                                                                Path:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                Imagebase:0x400000
                                                                File size:433208 bytes
                                                                MD5 hash:77B1761153F7E6CA4B76EA26C2FA6645
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.2031116791.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2031116791.00000000049EC000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low

                                                                Target ID:5
                                                                Start time:11:38:17
                                                                Start date:20/03/2023
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\rAEAT-AvisodeNotificaci__n.exe
                                                                Imagebase:0xb50000
                                                                File size:108664 bytes
                                                                MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2396701126.0000000000F30000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high

                                                                Target ID:6
                                                                Start time:11:38:17
                                                                Start date:20/03/2023
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff69cca0000
                                                                File size:875008 bytes
                                                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                Target ID:9
                                                                Start time:11:38:30
                                                                Start date:20/03/2023
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 2552
                                                                Imagebase:0x270000
                                                                File size:482640 bytes
                                                                MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:moderate

                                                                No disassembly