Edit tour

Windows Analysis Report
http://5.181.159.23/Downloads/reincarnation.zip

Overview

General Information

Sample URL:http://5.181.159.23/Downloads/reincarnation.zip
Analysis ID:1382834
Infos:

Detection

MailPassView
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected MailPassView
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Downloads suspicious files via Chrome
Machine Learning detection for dropped file
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Drops PE files
Found dropped PE file which has not been started or loaded
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sigma detected: File Download From Browser Process Via Inline URL
Sigma detected: Suspicious MsiExec Embedding Parent
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6300 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://5.181.159.23/Downloads/reincarnation.zip MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5976 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1892,i,16330728437254110003,3318182833698937117,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • rundll32.exe (PID: 5860 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • msiexec.exe (PID: 6084 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\Temp1_reincarnation.zip\reincarnation.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 4676 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6336 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 096A252D48F07B118B14BFE86FE65104 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • expand.exe (PID: 6668 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 544B0DBFF3F393BCE8BB9D815F532D51)
        • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • iTunesHelper.exe (PID: 5144 cmdline: "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe" MD5: ED6A1C72A75DEE15A6FA75873CD64975)
        • Autoit3.exe (PID: 2604 cmdline: "c:\temp\Autoit3.exe" c:\temp\script.au3 MD5: C56B5F0201A3B3DE53E561FE76912BFD)
          • WerFault.exe (PID: 4540 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 604 MD5: C31336C1EFC2CCB44B4326EA793040F2)
        • WerFault.exe (PID: 3988 cmdline: C:\Windows\system32\WerFault.exe -u -p 5144 -s 356 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • cmd.exe (PID: 5096 cmdline: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
SourceRuleDescriptionAuthorStrings
0000000D.00000002.2011015610.0000000004F54000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    0000000D.00000002.2011078602.00000000060B1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
      0000000D.00000003.1981885516.0000000004E97000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe" , CommandLine: "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 096A252D48F07B118B14BFE86FE65104, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 6336, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe" , ProcessId: 5144, ProcessName: iTunesHelper.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://5.181.159.23/Downloads/reincarnation.zip, CommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://5.181.159.23/Downloads/reincarnation.zip, CommandLine|base64offset|contains: -j~b,, Image: C:\Program Files\Google\Chrome\Application\chrome.exe, NewProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe, OriginalFileName: C:\Program Files\Google\Chrome\Application\chrome.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3572, ProcessCommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://5.181.159.23/Downloads/reincarnation.zip, ProcessId: 6300, ProcessName: chrome.exe
        Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files", CommandLine: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding 096A252D48F07B118B14BFE86FE65104, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 6336, ParentProcessName: msiexec.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files", ProcessId: 5096, ProcessName: cmd.exe
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\temp\Autoit3.exeJoe Sandbox ML: detected
        Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49731 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49729 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 40.126.29.7:443 -> 192.168.2.16:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49736 version: TLS 1.2
        Source: C:\Windows\System32\msiexec.exeFile opened: z:
        Source: C:\Windows\System32\msiexec.exeFile opened: x:
        Source: C:\Windows\System32\msiexec.exeFile opened: v:
        Source: C:\Windows\System32\msiexec.exeFile opened: t:
        Source: C:\Windows\System32\msiexec.exeFile opened: r:
        Source: C:\Windows\System32\msiexec.exeFile opened: p:
        Source: C:\Windows\System32\msiexec.exeFile opened: n:
        Source: C:\Windows\System32\msiexec.exeFile opened: l:
        Source: C:\Windows\System32\msiexec.exeFile opened: j:
        Source: C:\Windows\System32\msiexec.exeFile opened: h:
        Source: C:\Windows\System32\msiexec.exeFile opened: f:
        Source: C:\Windows\System32\msiexec.exeFile opened: b:
        Source: C:\Windows\System32\msiexec.exeFile opened: y:
        Source: C:\Windows\System32\msiexec.exeFile opened: w:
        Source: C:\Windows\System32\msiexec.exeFile opened: u:
        Source: C:\Windows\System32\msiexec.exeFile opened: s:
        Source: C:\Windows\System32\msiexec.exeFile opened: q:
        Source: C:\Windows\System32\msiexec.exeFile opened: o:
        Source: C:\Windows\System32\msiexec.exeFile opened: m:
        Source: C:\Windows\System32\msiexec.exeFile opened: k:
        Source: C:\Windows\System32\msiexec.exeFile opened: i:
        Source: C:\Windows\System32\msiexec.exeFile opened: g:
        Source: C:\Windows\System32\msiexec.exeFile opened: e:
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile opened: c:
        Source: C:\Windows\System32\msiexec.exeFile opened: a:
        Source: chrome.exeMemory has grown: Private usage: 20MB later: 31MB
        Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49731 version: TLS 1.0
        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
        Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.23
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKAccept-Ranges: bytesContent-Length: 1808242Content-Type: application/zipEtag: "17aed504efd07c001b9772"Last-Modified: Mon, 29 Jan 2024 13:38:46 GMTDate: Mon, 29 Jan 2024 16:13:17 GMTData Raw: 50 4b 03 04 14 00 00 00 08 00 a7 7c 3d 58 d0 d0 2a 63 ee 96 1b 00 00 10 3c 00 11 00 00 00 72 65 69 6e 63 61 72 6e 61 74 69 6f 6e 2e 6d 73 69 ec db 07 78 14 d5 da c0 f1 b3 e9 84 00 a1 4a 13 96 de d3 28 09 2c 92 b2 bb 21 a1 97 00 82 0a 2c c9 42 16 92 dd 75 b3 21 89 08 84 8e 11 0d 88 0a 48 ef 08 a8 34 bb 28 76 c4 86 1d 15 15 35 2a 76 45 45 f4 2a b9 ff 33 33 49 36 01 e3 26 d7 e7 fb 9e fb dc 7d 4f 7e 3b fd 9c 99 c9 cc ec 9c 33 b3 27 5f 6d 78 66 eb c1 96 1f 8b 2a 31 48 04 88 8b a5 61 22 48 1b d6 79 50 22 5c 08 3f 6d f8 62 69 69 69 d9 e8 52 5f fc 57 85 f0 85 2f 7c e1 0b 5f f8 c2 17 be f0 85 2f 7c e1 0b 5f fc 4f c4 9f d4 01 2f 6a ae 62 38 10 03 10 02 59 f7 af 83 50 d4 45 18 ea a1 3e 1a 08 a5 09 40 34 44 23 34 46 13 34 45 33 5c 81 e6 68 81 96 68 85 d6 b8 12 6d d0 16 7a b4 43 7b 74 40 47 74 42 67 74 41 57 74 43 77 f4 40 4f f4 42 04 22 11 85 68 c4 a0 37 fa a0 2f fa 21 16 71 e8 2f d4 f6 09 69 a0 90 ed 1a ea 70 3c dd 04 24 22 09 46 98 60 46 32 06 23 05 a9 18 82 a1 18 86 e1 18 81 91 18 85 d1 18 83 b1 48 c3 38 8c c7 04 5c 8d 89 98 84 6b 70 2d ae c3 64 4c c1 54 58 30 0d e9 c8 80 15 d3 31 03 99 b0 61 26 66 21 0b d9 b0 c3 01 27 ae 87 0b 39 70 23 17 b3 91 87 7c 14 e0 06 cc c1 8d 98 8b 79 98 8f 42 2c c0 42 2c c2 62 2c c1 52 2c c3 72 dc 84 22 dc 8c 15 b8 05 b7 a2 18 2b b1 0a b7 61 35 6e c7 1d b8 13 6b b0 16 eb 70 17 d6 63 03 36 62 13 36 63 0b b6 62 1b b6 63 07 76 62 17 76 63 0f ee c6 5e ec c3 7e dc 83 7b 71 1f 0e e0 20 0e e1 30 8e e0 7e 3c 80 07 f1 10 1e c6 23 78 14 8f e1 28 1e c7 13 38 86 27 f1 14 9e c6 33 78 16 cf e1 79 1c c7 0b Data Ascii: PK|=X*c<reincarnation.msixJ(,!,Bu!H4(v5*vEE*33I6&}O~;3'_mxf*1Ha"HyP"\?mbiiiR_W/|_/|_O/jb8YPE>@4D#4F4E3\hhmzC{t@GtBgtAWtCw@OB"h7/!q/ip<$"F`F2#H8\kp-dLTX01a&f!'9p#|yB,B,b,R,r"+a5nkpc6b6cbcvbvc^~{q 0~<#x(8'3xy
        Source: global trafficHTTP traffic detected: GET /Downloads/reincarnation.zip HTTP/1.1Host: 5.181.159.23Connection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
        Source: unknownDNS traffic detected: queries for: accounts.google.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
        Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49729 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 40.126.29.7:443 -> 192.168.2.16:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.16:49736 version: TLS 1.2

        System Summary

        barindex
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile dump: C:\Users\user\Downloads\reincarnation.zip (copy)Jump to dropped file
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\62f8ea.msi
        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIFA51.tmp
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5144 -s 356
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
        Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dll
        Source: classification engineClassification label: mal64.spyw.evad.win@32/35@8/97
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\68d7f3f9-e2f0-4059-93ba-92fc60501586.tmp
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5144
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2604
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7132:120:WilError_03
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF5AA17A32C889221C.TMP
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\msiwrapper.ini
        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://5.181.159.23/Downloads/reincarnation.zip
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1892,i,16330728437254110003,3318182833698937117,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\Temp1_reincarnation.zip\reincarnation.msi"
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 096A252D48F07B118B14BFE86FE65104
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        Source: C:\Windows\SysWOW64\expand.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\msiexec.exeProcess created: unknown unknown
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe"
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.au3
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5144 -s 356
        Source: C:\temp\Autoit3.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 604
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe"
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files"
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.au3
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1892,i,16330728437254110003,3318182833698937117,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
        Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\msiwrapper.ini
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeFile created: C:\temp\Autoit3.exeJump to dropped file
        Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe (copy)Jump to dropped file
        Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\ba84ee72f0364ddca96d220ebe28869c$dpx$.tmp\f0d3433fd1476a44adc4805716b9b77a.tmpJump to dropped file
        Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\ba84ee72f0364ddca96d220ebe28869c$dpx$.tmp\9c8f2adf59991f4b8f28dc08af9e5c06.tmpJump to dropped file
        Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\CoreFoundation.dll (copy)Jump to dropped file
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
        Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\temp\Autoit3.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\ba84ee72f0364ddca96d220ebe28869c$dpx$.tmp\f0d3433fd1476a44adc4805716b9b77a.tmpJump to dropped file
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: unknown FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: unknown FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: unknown FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: unknown FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: unknown FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation

        Anti Debugging

        barindex
        Source: C:\Windows\System32\msiexec.exeSystem information queried: CodeIntegrityInformation
        Source: C:\temp\Autoit3.exeProcess queried: DebugPort
        Source: C:\temp\Autoit3.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe"
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files"
        Source: C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exeProcess created: C:\temp\Autoit3.exe "c:\temp\Autoit3.exe" c:\temp\script.au3
        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\msiexec.exeQueries volume information: unknown VolumeInformation
        Source: C:\Windows\SysWOW64\expand.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0000000D.00000002.2011015610.0000000004F54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.2011078602.00000000060B1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000003.1981885516.0000000004E97000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure1
        Replication Through Removable Media
        Windows Management Instrumentation1
        Registry Run Keys / Startup Folder
        11
        Process Injection
        11
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local System2
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        1
        Registry Run Keys / Startup Folder
        11
        Virtualization/Sandbox Evasion
        LSASS Memory11
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media2
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        11
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        Extra Window Memory Injection
        1
        Rundll32
        NTDS11
        Peripheral Device Discovery
        Distributed Component Object ModelInput Capture4
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets2
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        File Deletion
        Cached Domain Credentials13
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Extra Window Memory Injection
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        http://5.181.159.23/Downloads/reincarnation.zip0%Avira URL Cloudsafe
        SourceDetectionScannerLabelLink
        C:\temp\Autoit3.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\ba84ee72f0364ddca96d220ebe28869c$dpx$.tmp\9c8f2adf59991f4b8f28dc08af9e5c06.tmp0%ReversingLabs
        C:\temp\Autoit3.exe0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        accounts.google.com
        172.253.124.84
        truefalse
          high
          www.google.com
          74.125.138.104
          truefalse
            high
            clients.l.google.com
            74.125.138.139
            truefalse
              high
              clients1.google.com
              unknown
              unknownfalse
                high
                clients2.google.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://5.181.159.23/Downloads/reincarnation.zipfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    52.168.117.173
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    74.125.138.104
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    74.125.138.139
                    clients.l.google.comUnited States
                    15169GOOGLEUSfalse
                    5.181.159.23
                    unknownMoldova Republic of
                    39798MIVOCLOUDMDfalse
                    64.233.176.94
                    unknownUnited States
                    15169GOOGLEUSfalse
                    108.177.122.94
                    unknownUnited States
                    15169GOOGLEUSfalse
                    64.233.176.139
                    unknownUnited States
                    15169GOOGLEUSfalse
                    172.253.124.84
                    accounts.google.comUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:39.0.0 Ruby
                    Analysis ID:1382834
                    Start date and time:2024-01-29 17:12:45 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:http://5.181.159.23/Downloads/reincarnation.zip
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:23
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal64.spyw.evad.win@32/35@8/97
                    • Exclude process from analysis (whitelisted): SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 64.233.176.94, 34.104.35.123
                    • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
                    • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • VT rate limit hit for: http://5.181.159.23/Downloads/reincarnation.zip
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.862589731362741
                    Encrypted:false
                    SSDEEP:
                    MD5:6004DE6238C30E641D0610D1FD831190
                    SHA1:B1C204DC5CD0088927DCFBD524CEADBEFA4BAABB
                    SHA-256:C73B6BADEE0F5F1114B6F58D524D186A03F7A21E980703298C5AFCE89AF40371
                    SHA-512:439BF86D50B9A080900397D42217B4CE6755396FD345566B08944912F4148AF12F7E1A964399AFB9FDCDF30B085E4246DC767B5BCBCA7D2EB746F6A32ED40229
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.1.0.1.8.4.1.6.4.8.5.6.9.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.1.0.1.8.4.1.7.2.1.6.6.8.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.2.9.0.0.3.9.-.0.c.5.f.-.4.4.f.f.-.a.8.2.6.-.7.a.5.1.1.6.e.0.e.5.b.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.1.f.6.e.c.4.-.1.7.5.6.-.4.8.5.9.-.b.d.7.6.-.9.9.1.d.1.0.6.8.a.c.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.u.t.o.i.t.3...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.u.t.o.I.t.3...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.2.c.-.0.0.0.1.-.0.0.1.4.-.4.8.3.8.-.7.a.1.c.c.e.5.2.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.0.6.f.a.0.9.b.3.8.c.9.c.3.b.a.4.5.c.7.3.2.a.4.d.c.9.a.8.4.6.1.0.0.0.0.0.9.0.8.!.0.0.0.0.2.a.4.0.6.2.e.1.0.a.5.d.e.8.1.3.f.5.6.8.8.2.2.1.d.b.e.b.3.f.3.f.f.3.3.e.b.4.1.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8113328767622522
                    Encrypted:false
                    SSDEEP:
                    MD5:76BE1BD42D3C5E3D1CE919B607369997
                    SHA1:664BFB35288B8BB8C9ADBA1733E5C681AAE54478
                    SHA-256:3395B39ACC2D645B27A16686F06129944B00EE2CE116BFFF28B58AED3C179158
                    SHA-512:A0A072A03AA607E7AE2D3AFD6F3199EF188DD62357A06788C2439E66885303FC4EEBBA184E9E5621E3FA1F36623E9F64B675B111D2B7401A6E02CE92324D6CB4
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.1.0.1.8.4.1.6.2.5.0.1.9.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.1.0.1.8.4.1.6.7.7.2.2.2.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.4.7.0.d.e.1.-.8.1.b.d.-.4.4.1.6.-.9.3.6.9.-.e.4.b.0.c.a.e.3.2.0.d.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.5.3.d.4.a.1.-.6.c.c.c.-.4.1.a.b.-.a.6.a.9.-.3.1.d.0.6.7.9.7.e.e.f.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.i.T.u.n.e.s.H.e.l.p.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.i.T.u.n.e.s.H.e.l.p.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.1.8.-.0.0.0.1.-.0.0.1.4.-.f.f.9.e.-.3.4.1.c.c.e.5.2.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.3.d.5.6.6.8.6.2.5.a.9.8.b.b.f.d.2.0.d.2.6.f.f.6.3.1.5.f.6.f.3.0.0.0.0.0.9.0.4.!.0.0.0.0.6.7.a.1.5.c.a.7.2.e.3.1.5.6.f.8.b.e.6.c.4.6.3.9.1.e.1.8.4.0.8.7.e.4.7.f.4.a.0.d.!.i.T.u.n.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Mon Jan 29 16:13:36 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):62880
                    Entropy (8bit):1.4059312104869237
                    Encrypted:false
                    SSDEEP:
                    MD5:2A033E6ED5A5D0D272CBA299CC8049EC
                    SHA1:BC1E166309A14DEA45875A7884CAE0A05AD7888A
                    SHA-256:B3A6EA4D88175DA8FCF774516A7171AFB2D5115E167A17C022B39490EE6B0E64
                    SHA-512:DB152D5FE419E5A1F56AF53C78B7411D9C83B1493090223E7B9F2988B953B68D46A8A95BC6C6FE82A20F175EDEB87A678507D0CA0D974A1C9301948E84329032
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .........e........................$...............B/..........T.......8...........T.......................................................................................................................eJ......t.......Lw......................T.............e............................. ..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):6758
                    Entropy (8bit):3.7254697674017185
                    Encrypted:false
                    SSDEEP:
                    MD5:65B6D34F0251592BAF6308A72448CD96
                    SHA1:EAD15D843DF90095576C5DE6E3091EB2362651E1
                    SHA-256:7F9985FC17ADC9D7503D572851B8A912279DBF8F963693622D555E5ACB2E7B9D
                    SHA-512:EFC402EE022C26A520F88C64E6E98B7926074C94C1251C984E716EE8F1810F9559173AF090AEC9123013B4A7D70989420C0C35AEF59A5C856A1B0DD3E30EF1FE
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.4.4.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Mon Jan 29 16:13:36 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):184554
                    Entropy (8bit):0.9471282885370743
                    Encrypted:false
                    SSDEEP:
                    MD5:6A87B017D8BB29D120FE43561B08EB6D
                    SHA1:91CEB0898200EA166297AD2609E37AF169AC366C
                    SHA-256:073B9CC49F456E68D3E3933EE255BE44BA77A68FA383154102CDE2DF7589AB88
                    SHA-512:F06C3C07060957190B1902A820FAB54244A1A4E2EF6476667C357883C90C8DD1D65B0BE79F8F08046DE86D279033F3B86266CAC8ED3370F72472229BB5F39DF8
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .........e....................................d....,..........T.......8...........T........... ..............l...........X...............................................................................eJ..............GenuineIntel............T.......,.....e............................. ..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4766
                    Entropy (8bit):4.495599372278401
                    Encrypted:false
                    SSDEEP:
                    MD5:3C51470E6FBEC204143392F0206F474F
                    SHA1:A455C32C55FA3273C4DCA132A7D18BEF5B4C6E14
                    SHA-256:CB3482DA8A316991897E64CA574B2F07183C6167DE978C48AA521DA3557FFBBE
                    SHA-512:6E49F8B3454E8C47C86DAFC1FAD7099C7194BCE82860DDC1B434857EF2E28F96E94C7F0A8C4746C93C65DE236DD1DEEDA37902CB8BB2BF7881D6FCC844F9F78A
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="170356" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8314
                    Entropy (8bit):3.693199114489923
                    Encrypted:false
                    SSDEEP:
                    MD5:E7B1B4AAED0BD9D50791AB15C004124B
                    SHA1:FC7A59098AB30651AD25CA65B8D839744D7A8933
                    SHA-256:F3934C70C671FAB44514101971322AB98EC9331DA3F5B01C71A781B100849510
                    SHA-512:3805CF1996AB7A3FA71F73E0847DA33CF24B9729C19EEFB01DEDAB8A32DA4E6E8D54C1A72EB5CA52555BABEC76077DF69D423E4DA650DAC0F990C1F4E3AC7632
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.6.0.4.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4638
                    Entropy (8bit):4.452351938848879
                    Encrypted:false
                    SSDEEP:
                    MD5:40B66111929F7C51E832DC48AB4D253F
                    SHA1:6BCE3C9DB7F4B70259D01B495B3D2CD17481169B
                    SHA-256:64D1D63C85FEA7E37B56BA5F34E66CAF2DF502D5A05D5F0D236F9121DA31C37C
                    SHA-512:127F3492A926B74285972DBDC8A9C3C00D086362C7EF1E0D034AF75472AEF60E18C57F39D852A8EA8FF7F051ACDF09C95344809B805D982D2F8D1C70CA78A374
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="170356" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:Microsoft Cabinet archive data, many, 3684121 bytes, 3 files, at 0x2c +A "CoreFoundation.dll" +A "iTunesHelper.exe", ID 35065, number 1, 113 datablocks, 0 compression
                    Category:dropped
                    Size (bytes):3684121
                    Entropy (8bit):7.062922354388952
                    Encrypted:false
                    SSDEEP:
                    MD5:2CA32763A836BDA6629439DFDF7574FB
                    SHA1:73DF86B5C6EFDDEF1759B803FE075F9F0414A75A
                    SHA-256:249CCC81506722721DA5774E2D3718B02FA79F1A2F4024E609E6FCF1B6BEDF0A
                    SHA-512:248DF241C4DE5FC942163EC9C447328AADAF824C4323A676B3C261027237F3CF72390A372B67C678B97CE8F62E3B92F3E218F6D29BE47BB45BA604B4D7B1DF1A
                    Malicious:false
                    Reputation:low
                    Preview:MSCF.....78.....,.......................q.............=X., .CoreFoundation.dll.`.........=X., .iTunesHelper.exe.....`O....=X., .sqlite3.dll.........MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d......e.........." ................@.........@...........................................`.......................... ............... ...,...................`...1...........`.......................................................................................text...D........................... ..`.data........0......................@....bss.........0...........................idata..............................@....didata.............."..............@....edata...,... .......&..............@..@.rdata..E....P.......T..............@..@.reloc.......`.......V..............@..B.pdata...1..
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):1619456
                    Entropy (8bit):6.016204754935511
                    Encrypted:false
                    SSDEEP:
                    MD5:CE2E53DA2015987538D794B04C4AE0D5
                    SHA1:6952BA24FCC3BB41D4DD03D41C56CA12F4CCE95A
                    SHA-256:1E3BDDD68B9DBDF728AFA28A29DB324B21D71FA145E6EFFF8D44B46F3637D9F4
                    SHA-512:DDD0D0746A180F1782CB9C13CF37992D80E2B8F3C0E043FE5BA96F80ADAC066DE79E59D10D5E1E91E22C434ECA65793EFC17459AB2D6565B2FC6986C86B146B0
                    Malicious:true
                    Reputation:low
                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d......e.........." ................@.........@...........................................`.......................... ............... ...,...................`...1...........`.......................................................................................text...D........................... ..`.data........0......................@....bss.........0...........................idata..............................@....didata.............."..............@....edata...,... .......&..............@..@.rdata..E....P.......T..............@..@.reloc.......`.......V..............@..B.pdata...1...`...2...V..............@..@.rsrc...............................@..@....................................@..@........................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):366944
                    Entropy (8bit):6.80696281718998
                    Encrypted:false
                    SSDEEP:
                    MD5:ED6A1C72A75DEE15A6FA75873CD64975
                    SHA1:67A15CA72E3156F8BE6C46391E184087E47F4A0D
                    SHA-256:0D8878CCA08903777888B3681F90E4A07C7AEF7D9600A67DFA985844D4BF5EDA
                    SHA-512:256C2EBFEB42C2D3340D8BB423EF0AE48D5FB9FE5CA09C363595F51A03007482B67A777E4CAE7A8194F69BC3A3FBCDB9ABB5C9F92097925272431BB9D50F5C03
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S7...V...V...V..\....V..X*...V..X*...V..\....V..\....V..\....V...?...V...V...V..X*..)V...*...V...*@..V...*...V..Rich.V..................PE..d...c.^d.........."...."............T..........@....................................o.....`..........................................................`...5... ...%...J..`O......x.......T.......................(.......@............................................text............................... ..`.rdata..............................@..@.data...$(..........................@....pdata...%... ...&..................@..@_RDATA..\....P......................@..@.rsrc....5...`...6..................@..@.reloc..x............B..............@..B................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):1619456
                    Entropy (8bit):6.016204754935511
                    Encrypted:false
                    SSDEEP:
                    MD5:CE2E53DA2015987538D794B04C4AE0D5
                    SHA1:6952BA24FCC3BB41D4DD03D41C56CA12F4CCE95A
                    SHA-256:1E3BDDD68B9DBDF728AFA28A29DB324B21D71FA145E6EFFF8D44B46F3637D9F4
                    SHA-512:DDD0D0746A180F1782CB9C13CF37992D80E2B8F3C0E043FE5BA96F80ADAC066DE79E59D10D5E1E91E22C434ECA65793EFC17459AB2D6565B2FC6986C86B146B0
                    Malicious:true
                    Reputation:low
                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d......e.........." ................@.........@...........................................`.......................... ............... ...,...................`...1...........`.......................................................................................text...D........................... ..`.data........0......................@....bss.........0...........................idata..............................@....didata.............."..............@....edata...,... .......&..............@..@.rdata..E....P.......T..............@..@.reloc.......`.......V..............@..B.pdata...1...`...2...V..............@..@.rsrc...............................@..@....................................@..@........................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1696677
                    Entropy (8bit):7.370905376771819
                    Encrypted:false
                    SSDEEP:
                    MD5:076ED533D27F3BD8678AB4B7015F0976
                    SHA1:657AA4110236C4E3CFA429FC039CA49486A1EE82
                    SHA-256:3035FB3598EF2DFCE3E0472C44A6C53A7C0E18B451CA58D8AD6DEF288D890CA3
                    SHA-512:22B3E3FC5F18E368763C1DBFD63990A5EEC99A39FB6590C92FA37FF7798FE075DBAF03FC1DCAE5CB4B045E300E57A55B80FE951E11325E7BE7414B862015DF0F
                    Malicious:false
                    Reputation:low
                    Preview:/.)..jHVb.$.c...iT.nH...lTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdkHV.YlZ{.A.C.m..K..6!.'D.:9.;.9D.=%.i.1D.=8B<.0..h..'Z`i`labIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHV2.lT..CV^e.1djHVbIlT.jjViKdTd.JVb.lTdjHV..nTdzHVbI,TdjHVbYlTdzHVdIlTdjHVdIlTdjHVb.hTdnHVbIlTfj(.bI|TdjHVb.lTdjHVbI|TdjHVbilTdjHVbIlTtjHVbyhT.jHVbYhTffHVb.hTd~HVb.hT\OHVbIlTdjHVb)hTPKHVbIlTdjHVbIlTdjHVbIlTdjHVb.hTLjHVbIlTdjHVbIlTdjHVZZhT.hHVbihT.hHVbIlTdjHVbIlTdjHVL=.,.jHVb.nTdzHVb.nTdzHVbIlTdjHVbIlTDjH6L-. .jHVb)lTdjKVb)lTdjKVbIlTdjHVbIlT$jH.L+.'djHVb.lTd.KVb.lTd.KVbIlTdjHVbIlTdjH.L .5..HVbYlTdzLVbYlTdzLVbIlTdjHVbIlT$jH.L-.0..)VbYlTdJLVbYlTdJLVbIlTdjHVbIlT$jH.L,.5..HVbYlTdZLVbYlTdZLVbIlTdjHVbIlT$jH.L=.'djHVbYlTd*LVbYlTd*LVbIlTdjHVbIlTdjH.L;.5..HVbYlTd:LVbYlTd:LVbIlTdjHVbIlT$jH.L;.8..HVbylTd.LVbylTd.LVbIlTdjHVbIlT$jH.L9.5..HVbylTd.LVbylTd.LVbIlTdjHVbIlT$jH.L;.&.jHVbilTd.LVbilTd.LVbIlTdjHVbIlT$jH.bIlTdjHVbIlTd.LVbIlTd.KVbIlTdjHVbIlT$jH.
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):366944
                    Entropy (8bit):6.80696281718998
                    Encrypted:false
                    SSDEEP:
                    MD5:ED6A1C72A75DEE15A6FA75873CD64975
                    SHA1:67A15CA72E3156F8BE6C46391E184087E47F4A0D
                    SHA-256:0D8878CCA08903777888B3681F90E4A07C7AEF7D9600A67DFA985844D4BF5EDA
                    SHA-512:256C2EBFEB42C2D3340D8BB423EF0AE48D5FB9FE5CA09C363595F51A03007482B67A777E4CAE7A8194F69BC3A3FBCDB9ABB5C9F92097925272431BB9D50F5C03
                    Malicious:true
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S7...V...V...V..\....V..X*...V..X*...V..\....V..\....V..\....V...?...V...V...V..X*..)V...*...V...*@..V...*...V..Rich.V..................PE..d...c.^d.........."...."............T..........@....................................o.....`..........................................................`...5... ...%...J..`O......x.......T.......................(.......@............................................text............................... ..`.rdata..............................@..@.data...$(..........................@....pdata...%... ...&..................@..@_RDATA..\....P......................@..@.rsrc....5...`...6..................@..@.reloc..x............B..............@..B................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1696677
                    Entropy (8bit):7.370905376771819
                    Encrypted:false
                    SSDEEP:
                    MD5:076ED533D27F3BD8678AB4B7015F0976
                    SHA1:657AA4110236C4E3CFA429FC039CA49486A1EE82
                    SHA-256:3035FB3598EF2DFCE3E0472C44A6C53A7C0E18B451CA58D8AD6DEF288D890CA3
                    SHA-512:22B3E3FC5F18E368763C1DBFD63990A5EEC99A39FB6590C92FA37FF7798FE075DBAF03FC1DCAE5CB4B045E300E57A55B80FE951E11325E7BE7414B862015DF0F
                    Malicious:false
                    Reputation:low
                    Preview:/.)..jHVb.$.c...iT.nH...lTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdkHV.YlZ{.A.C.m..K..6!.'D.:9.;.9D.=%.i.1D.=8B<.0..h..'Z`i`labIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHVbIlTdjHV2.lT..CV^e.1djHVbIlT.jjViKdTd.JVb.lTdjHV..nTdzHVbI,TdjHVbYlTdzHVdIlTdjHVdIlTdjHVb.hTdnHVbIlTfj(.bI|TdjHVb.lTdjHVbI|TdjHVbilTdjHVbIlTtjHVbyhT.jHVbYhTffHVb.hTd~HVb.hT\OHVbIlTdjHVb)hTPKHVbIlTdjHVbIlTdjHVbIlTdjHVb.hTLjHVbIlTdjHVbIlTdjHVZZhT.hHVbihT.hHVbIlTdjHVbIlTdjHVL=.,.jHVb.nTdzHVb.nTdzHVbIlTdjHVbIlTDjH6L-. .jHVb)lTdjKVb)lTdjKVbIlTdjHVbIlT$jH.L+.'djHVb.lTd.KVb.lTd.KVbIlTdjHVbIlTdjH.L .5..HVbYlTdzLVbYlTdzLVbIlTdjHVbIlT$jH.L-.0..)VbYlTdJLVbYlTdJLVbIlTdjHVbIlT$jH.L,.5..HVbYlTdZLVbYlTdZLVbIlTdjHVbIlT$jH.L=.'djHVbYlTd*LVbYlTd*LVbIlTdjHVbIlTdjH.L;.5..HVbYlTd:LVbYlTd:LVbIlTdjHVbIlT$jH.L;.8..HVbylTd.LVbylTd.LVbIlTdjHVbIlT$jH.L9.5..HVbylTd.LVbylTd.LVbIlTdjHVbIlT$jH.L;.&.jHVbilTd.LVbilTd.LVbIlTdjHVbIlT$jH.bIlTdjHVbIlTd.LVbIlTd.KVbIlTdjHVbIlT$jH.
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:data
                    Category:modified
                    Size (bytes):1500
                    Entropy (8bit):3.673203108965399
                    Encrypted:false
                    SSDEEP:
                    MD5:2684553E96A578D3F1953325128597F5
                    SHA1:25853A6C7E2C3AACDF17F5A995A43B1F93BE388D
                    SHA-256:E2866FC6D17F3882509C6F5C8C96C164B82756F155B244DCAF6CBBD09EDEE706
                    SHA-512:736D15F33D2F0DE350CDC678155D2FEBD5571924B240F9FE8DE5D75A92AD4CF989881647F05741C71AAEEE4F225890CF7D4CC61EA4E9D76CB0D5D5DB478FF1BE
                    Malicious:false
                    Reputation:low
                    Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.{.2.C.B.A.8.8.3.F.-.5.1.A.6.-.3.D.7.D.-.D.B.B.9.-.0.5.2.7.D.3.9.4.3.3.C.B.}...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.H.i.d.d.e.n...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.n.e.v.e.r...B.a.s.e.N.a.m.e.=.i.T.u.n.e.s.H.e.l.p.e.r...e.x.e...C.a.b.H.a.s.h.=.2.4.9.c.c.c.8.1.5.0.6.7.2.2.7.2.1.d.a.5.7.7.4.e.2.d.3.7.1.8.b.0.2.f.a.7.9.f.1.a.2.f.4.0.2.4.e.6.0.9.e.6.f.c.f.1.b.6.b.e.d.f.0.a...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.F.I.L.E.S.D.I.R.*...U.I.L.e.v.e.l.=.5...F.o.c.u.s.=.y.e.s...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.f.a.d.3.5.3.5.6.-.b.3.0.e.-.4.7.5.3.-.9.b.b.f.-.6.4.8.3.5.c.8.b.a.f.2.6.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.f.a.d.3.5.3.5.6.-.b.3.0.e.-.4.7.5.3.-.9.b.b.f.-.6.4.8.3.5.c.8.b.a.f.2.6.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=...R.u.n.B.e.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 29 15:13:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.9825758321868268
                    Encrypted:false
                    SSDEEP:
                    MD5:E8C838C626AE62E166FCF262E452D480
                    SHA1:600744EAAB1FC2AE77A0CAF4E19DBDA3059B411F
                    SHA-256:D1642174E6A6FF7083A8F4A63D488774CA749DBBB7179FA20C5A443D964BCA27
                    SHA-512:27AAD190B8E4681E5326DECCD114255F3B6E65812572DD3CAF6158821864FB53D517E1758FC8B3AEA9AB7AC23EB0369FF556B23B73324C336DADAE8FA86E6E71
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....\.`..R..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 29 15:13:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):4.001482227077573
                    Encrypted:false
                    SSDEEP:
                    MD5:2B0255F2E196A6C38FBB969FC517D8C5
                    SHA1:D718A010081BA6AFF24DC3684B58B9C59E7F3098
                    SHA-256:F6DA486D2F0238D23D3ED105C0A71114343EA5A3A99F821DE631CA39F841A6C7
                    SHA-512:CCDF6872038E99F38918180FD54782B0FAED4A6385C49F47D396816A1AA43F6733D8E1A351BC7F3FCA9A6AC677B8F904A02164551AC139F966132B9A3D0E94C4
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,......S..R..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.0085426673087765
                    Encrypted:false
                    SSDEEP:
                    MD5:A98A0EB82186477557D6DEDEF566AE76
                    SHA1:9D3F1925C76320BB71BFBAC3FCC173AEEA6323A1
                    SHA-256:92A7CBB569339354CF1752A6F4D87CA8151D8CFB51DE7FBD97EE12B04E27632F
                    SHA-512:BAC79481DEC9D0BF70586BED4F9C868674272329CC210ED72E5F021CB68F3EF20719EA62AC8EB440860BBCD171586238937A7035319D560EF3A0D220569718DF
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 29 15:13:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9985981440385694
                    Encrypted:false
                    SSDEEP:
                    MD5:2A9E7967E6138709846DEBB0C7EC99D1
                    SHA1:FD005D8D83E07D7AFF9052F9BDA0BFD446747933
                    SHA-256:E129C7B617C0E74B9504D6B1B4B845DEFDDD43CEAAC6E3CED8EF21D79A68D894
                    SHA-512:B480ED9CA27AF52D0F4F7B50BD752008F1F06AC4CD768A88E2D5EE90E207D97E08D6093F692D8FF8D807A4BDE69BC18FFB45CC7ABA52B38228E510F6B4008187
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....4ZM..R..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 29 15:13:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9858185597701783
                    Encrypted:false
                    SSDEEP:
                    MD5:0656BC878607E0E0FCF908D4313FE1C0
                    SHA1:5ADEAEA515482E240C2DDE6EDA94772BC494DC81
                    SHA-256:EDFF2DDA743F9DE4AEB308D8EB9194904ECFEA465B3F3326A746BAA0214334D2
                    SHA-512:A1C71A7781EA9C25EB01AC02EC871DCBD4C1CDB91E3089EAA397397688FB2333CDC98E619E2056EB608F5B3BC19246E09AAD16022E74035968AD83406B29B224
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....e.[..R..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 29 15:13:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9965019025567345
                    Encrypted:false
                    SSDEEP:
                    MD5:D5565B848CAA4272273C628EF24D7763
                    SHA1:62E2D254EED5DE75AFC3ACCAA2286B29F0A11165
                    SHA-256:017B066B17F7C23C58078CE9320C8E687F1AB139278A4922D28CFDB0C0870160
                    SHA-512:C7EE1DA21A97C9A9522BE3E2DFA4D37E82BE55D012FF9111B2F2C0DFB2441600179ACDD9F9760408DB7E710918D7AB67FCA7B437709E1E77F645BAC67705EFC6
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ...$+.,....:.C..R..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I=X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V=X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V=X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V=X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V=X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............cx.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                    Category:dropped
                    Size (bytes):3084
                    Entropy (8bit):7.9034549104548715
                    Encrypted:false
                    SSDEEP:
                    MD5:504A063DB1FB7C2654A99BC34A30A0C4
                    SHA1:B514D86534ED4D95277FC1495BB45F1B871DF4DE
                    SHA-256:C47293597A412672905663D57AA658061B717D2E7FA5A2BBCC7DF7D1DF727F42
                    SHA-512:2FD58F9F9F9CA90131F34F95EE749E147F99A051B5D43EE21FBC7CA22F22FDEE0FBC8B7C6BE155000FFBA65B5F04036F1E5A631AD969105D0414A296FE6D5ACE
                    Malicious:false
                    Reputation:low
                    Preview:PK.........|=X..*c.....<.....reincarnation.msi...x........J....(.,...!.....,.B...u.!........H...4.(v....5*vEE.*..33I6..&......}O~;......3.'_mxf.....*1H....a"H..yP"\.?m.biii..R_.W.../|.._....../|.._.O.../j.b8....Y...P.E..>....@4D#4F.4E3\..h..h...m..z.C{t@GtBgtAWtCw.@O.B."..h.7../.!.q./...i.....p<..$".F.`F2.#.................H.8...\....kp-..dL.TX0.....1...a&f!....'...9p#....|........y..B,.B,.b,.R,.r.".......+...a5n....k...p..c.6b.6c..b..c.vb.vc...^..~.{q... ..0..~<......#x...(...8.'....3x...y...8....^.+x.'..^..x.o.m..Sx...}........d..'..%........._..|...=~..8...3~.y......._....".......?... .#.u....C=.G...!..1..)...4G..D+..h......:..:........z.."..(D#....}....C.....q..!..HD..0..d.F.R1.C1..1.#1..1.c..q......1...Z\.....`...+.c.2a.L.B..a..N\..r.F.f#..(.....1..0..X..X..X..X...E..+p.nE1Vb.n.j.;p'.`-......l.&l..l.6l................>..A..a...x...!<.G.(..Q<.'p.O.)<.g.,...8..p./.%..W.*N.5..7.&...x.......8...!>..|.O.)J..>..8./....7....{...q.?.g........~.....E.B6...... .A.F.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                    Category:dropped
                    Size (bytes):1808242
                    Entropy (8bit):7.990710015244894
                    Encrypted:true
                    SSDEEP:
                    MD5:92DF4FED3C92F414527BE714440772D6
                    SHA1:5DD3EF94EB39F8B2F567EBFCC7806A4D332381CB
                    SHA-256:2E1BCF78FC03408AFBD8F0EEE3607B40780CC0362145C0CA9C2E063F7D33FD40
                    SHA-512:39362D7ACFF0D700F7F4EB9F5535340D5C09B6DCB69F2B798B8DA4081F7B65604F8BFDB24BC98B28A68E61482A361AF56AC620FA7059EBAFFDEFE8C492B9E0CF
                    Malicious:true
                    Reputation:low
                    Preview:PK.........|=X..*c.....<.....reincarnation.msi...x........J....(.,...!.....,.B...u.!........H...4.(v....5*vEE.*..33I6..&......}O~;......3.'_mxf.....*1H....a"H..yP"\.?m.biii..R_.W.../|.._....../|.._.O.../j.b8....Y...P.E..>....@4D#4F.4E3\..h..h...m..z.C{t@GtBgtAWtCw.@O.B."..h.7../.!.q./...i.....p<..$".F.`F2.#.................H.8...\....kp-..dL.TX0.....1...a&f!....'...9p#....|........y..B,.B,.b,.R,.r.".......+...a5n....k...p..c.6b.6c..b..c.vb.vc...^..~.{q... ..0..~<......#x...(...8.'....3x...y...8....^.+x.'..^..x.o.m..Sx...}........d..'..%........._..|...=~..8...3~.y......._....".......?... .#.u....C=.G...!..1..)...4G..D+..h......:..:........z.."..(D#....}....C.....q..!..HD..0..d.F.R1.C1..1.#1..1.c..q......1...Z\.....`...+.c.2a.L.B..a..N\..r.F.f#..(.....1..0..X..X..X..X...E..+p.nE1Vb.n.j.;p'.`-......l.&l..l.6l................>..A..a...x...!<.G.(..Q<.'p.O.)<.g.,...8..p./.%..W.*N.5..7.&...x.......8...!>..|.O.)J..>..8./....7....{...q.?.g........~.....E.B6...... .A.F.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                    Category:dropped
                    Size (bytes):1808242
                    Entropy (8bit):7.990710015244894
                    Encrypted:true
                    SSDEEP:
                    MD5:92DF4FED3C92F414527BE714440772D6
                    SHA1:5DD3EF94EB39F8B2F567EBFCC7806A4D332381CB
                    SHA-256:2E1BCF78FC03408AFBD8F0EEE3607B40780CC0362145C0CA9C2E063F7D33FD40
                    SHA-512:39362D7ACFF0D700F7F4EB9F5535340D5C09B6DCB69F2B798B8DA4081F7B65604F8BFDB24BC98B28A68E61482A361AF56AC620FA7059EBAFFDEFE8C492B9E0CF
                    Malicious:false
                    Reputation:low
                    Preview:PK.........|=X..*c.....<.....reincarnation.msi...x........J....(.,...!.....,.B...u.!........H...4.(v....5*vEE.*..33I6..&......}O~;......3.'_mxf.....*1H....a"H..yP"\.?m.biii..R_.W.../|.._....../|.._.O.../j.b8....Y...P.E..>....@4D#4F.4E3\..h..h...m..z.C{t@GtBgtAWtCw.@O.B."..h.7../.!.q./...i.....p<..$".F.`F2.#.................H.8...\....kp-..dL.TX0.....1...a&f!....'...9p#....|........y..B,.B,.b,.R,.r.".......+...a5n....k...p..c.6b.6c..b..c.vb.vc...^..~.{q... ..0..~<......#x...(...8.'....3x...y...8....^.+x.'..^..x.o.m..Sx...}........d..'..%........._..|...=~..8...3~.y......._....".......?... .#.u....C=.G...!..1..)...4G..D+..h......:..:........z.."..(D#....}....C.....q..!..HD..0..d.F.R1.C1..1.#1..1.c..q......1...Z\.....`...+.c.2a.L.B..a..N\..r.F.f#..(.....1..0..X..X..X..X...E..+p.nE1Vb.n.j.;p'.`-......l.&l..l.6l................>..A..a...x...!<.G.(..Q<.'p.O.)<.g.,...8..p./.%..W.*N.5..7.&...x.......8...!>..|.O.)J..>..8./....7....{...q.?.g........~.....E.B6...... .A.F.
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):20480
                    Entropy (8bit):1.164545388662407
                    Encrypted:false
                    SSDEEP:
                    MD5:89AF66492B8DDE5D4AD4629AE9F2C2A5
                    SHA1:B5EBA879D0AAB83CD0C9326B2C1C949C456B2311
                    SHA-256:64B585C07CD1A9DD6D5571580C77692638E5B8078DB75F643FCBCC3D156CAF14
                    SHA-512:B5C76F2E481D18E0A0C02CD9A95EA6CADB8156795C1CFB865DA164078BBE24038AE48DA727C3C2D9B080B665E9E7AB54313B1216FF366B734D6790C7274325A8
                    Malicious:false
                    Reputation:low
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):0.0723610703474044
                    Encrypted:false
                    SSDEEP:
                    MD5:120926A4AAB26BA0AE4484D5225BBBCE
                    SHA1:58C27C5560562BB56BCE54277FA8379EEE592AEE
                    SHA-256:A3441D24204933194E456C40323071478EE8FFD250077787AC64CDDDDF92E91D
                    SHA-512:766A49B2AEF518F3BAEA057CAAE9B277B3688B8E0D9BF816EB4410DCE6C8773419CD0C72F9EAF0B7F4F7D46E3C69C60BF707ADFA387912D37F49D64B7CC3CC27
                    Malicious:false
                    Reputation:low
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):1.2608166502440739
                    Encrypted:false
                    SSDEEP:
                    MD5:3E187EA27B39C17A4050B7BC7EE3A730
                    SHA1:101B55FE3521274C668B9F6E0980EB37D60316CB
                    SHA-256:A080F4EBC30C39A44A2FEB0DD326C94470CAC3F49C2235254A538C8873863F43
                    SHA-512:715FD45FD8CCE285DBB6DB3861B00468233FFFBF721F4A0B27908FAB8300EB40601042BB08DE29B594B0CD67A05D54F2045F502AD0C4326AE537D3316A0D97AD
                    Malicious:false
                    Reputation:low
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):512
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:
                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                    Malicious:false
                    Reputation:low
                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):69632
                    Entropy (8bit):0.148017230085671
                    Encrypted:false
                    SSDEEP:
                    MD5:87C9845938C8AF6380E20A00D38FF4E6
                    SHA1:16E8294709A185BF9431AE06C08060BE3B34F528
                    SHA-256:F36E38CD79C9F66221A06D54064B88CCD2F576908315970CAAA7CBFCF4811996
                    SHA-512:2C89B117DD3D859A9A9F167EA65E238DA2B8CA48D4C1311374612D666A53F0EED9C9BF5C6285343B9664C90BA82D3D58452DDF776F439A372774C408D375DB0D
                    Malicious:false
                    Reputation:low
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\msiexec.exe
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):20480
                    Entropy (8bit):1.5762105579100643
                    Encrypted:false
                    SSDEEP:
                    MD5:7DCBD542CA351874911D10F6FA462DC4
                    SHA1:663848594311A77AEE5EC89E216AB1D5F310C86D
                    SHA-256:FF77D0448D310F3D620C385BCE9D06262E60D1A92B0BFFE9C8BA8CE9359A5903
                    SHA-512:63228D083C41F770DCD09F0A077C68C7B087F3AF8D7CBC01E0A8FDB24AD78010C9479EAA268D9DA2065ACA9FC2941573FCFE57B354F72B2DB7D62D749411F422
                    Malicious:false
                    Reputation:low
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):893608
                    Entropy (8bit):6.620131693023677
                    Encrypted:false
                    SSDEEP:
                    MD5:C56B5F0201A3B3DE53E561FE76912BFD
                    SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                    SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                    SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 0%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):481936
                    Entropy (8bit):6.741471681385531
                    Encrypted:false
                    SSDEEP:
                    MD5:51CAC8AD7FCA3B404D7BB89BEEF8890B
                    SHA1:BA76502DEF5D65AF3D98569A9812BCBB4D52A973
                    SHA-256:97C6D302415978C1E3B6E336F213FC4A66C814F489604E27D277CFD259342FE0
                    SHA-512:6E7AD62E4E7CB7DA412FEC06885A367E82AE61F7C3658F9B36148CFE1BE2CFA3270CD00A46D519B15BB62B77CDCC87EDA54799BD7CE395A0D2D0627B548677D5
                    Malicious:false
                    Reputation:low
                    Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M........+..M...F.f.q..R,..].>>.r.nw.i@.../9...w.6..;..$dr..yO.n....-.....qH..O....?@....L.9"...]g......s_.1N(...+...............R...L.>.R...L.>kC.R......%x....}...q..U-...(....%....V..?p.h.....l)".N.#.R......v.k@3.Q..\...I.h...%D'7...Y.....6(..)w....+...........7.`....8.u....h..0p.R%. *.`..^-.B..=H.{.X......;.......8...R.....>.R...L.>m.....r..s..5...x...(.U?j....$.1.#.~.\......<.i.....+.0..Fi..4...'G..g..sA.W.4....=._..bW./.Q....M.eU..D..x..g 8+HK...6.yi.z..3../N.T.6.;...:...k..2..I.=.hN6..)..(.D^...V.r.=.......n<7.~....$l...[...g..L.w2.NA....{].5.5e.t26....x..:....r.i.% ...w.....\|f6.a...G-......(..C.Z...R4.j../...p.t....&..l.P].~...?....L......^.v@TyJ..D.. ??.p....J.[y.m..oGsJ.0t#q..M....n...=....z/..c........O.ya.Mc.3..}....G%.P....x<...3.[XP....BM#;.:S..._.^!../.Z..$.....G$B.H...4.8.D..*.r.P.7Rr...s.j')4.sS.(X..TBO'NS.;......9...@...l.....c.o
                    Process:C:\Users\user\AppData\Local\Temp\MW-fad35356-b30e-4753-9bbf-64835c8baf26\files\iTunesHelper.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):76
                    Entropy (8bit):6.247927513443591
                    Encrypted:false
                    SSDEEP:
                    MD5:3F252D7956C3E1472A0F208AAC6DA8CE
                    SHA1:41A5E96C5CA98F5F8E78894C0CE03590C9BF6CB3
                    SHA-256:1E5385399BD1A8D6D531B820DA88D0B217B863EC2E7100E1533E64605FADD898
                    SHA-512:1AB1C23095D5061F73DF8569C2FB2ED235E478FFA716FFD93801D52A75E631BB0BAC4CF39EF0DCD4A186460E4C93FCEC4F4D6C07FA4B91D926B54A61B5B2C00A
                    Malicious:false
                    Reputation:low
                    Preview:BnwZ&=KTJQ$Ovj6LGt}*h"y84k0uWd[zIpC{Vfe9R,1.Y3Pi]HXcg)UAF(NE5msx2lqb7SDraoM
                    Process:C:\Windows\SysWOW64\expand.exe
                    File Type:ASCII text, with CRLF, CR, LF line terminators
                    Category:dropped
                    Size (bytes):321
                    Entropy (8bit):4.700596972803069
                    Encrypted:false
                    SSDEEP:
                    MD5:97C98B7E5CE0D46EA5CD596E5F2E9C00
                    SHA1:F194576E9826BD19A3B25B0610D5ED16979B0DBD
                    SHA-256:0804631B14ED78FAA94B3DEE5BD1AFCA0C9C316F290CE06B335A94DC2271C05A
                    SHA-512:3B21A17334F1B4E55905F19892CCACAD563C8E5C7864D62E126B8FE36228668939844E832E5B01790B544A4B0FD0B269EC09B9F93637F5C19140742DFE0D15F0
                    Malicious:false
                    Reputation:low
                    Preview:Microsoft (R) File Expansion Utility..Copyright (c) Microsoft Corporation. All rights reserved.....Adding files\CoreFoundation.dll to Extraction Queue..Adding files\iTunesHelper.exe to Extraction Queue..Adding files\sqlite3.dll to Extraction Queue....Expanding Files ........Expanding Files Complete .....3 files total...
                    No static file info