Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rapid Test Installer.exe

Overview

General Information

Sample name:Rapid Test Installer.exe
Analysis ID:1566410
MD5:f74ab47d148fa2bbdc50849a32837952
SHA1:869aacf8b648e248a9e2594c74df11733281f4e6
SHA256:dc4d5e282b26d18a7c78807e0152cc79c3fc5d2f1f33e78e4d1da7d5f8e58375
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Rapid Test Installer.exe (PID: 7572 cmdline: "C:\Users\user\Desktop\Rapid Test Installer.exe" MD5: F74AB47D148FA2BBDC50849A32837952)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\Rapid Test Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Rapid Test Installer.exe.logJump to behavior
Source: Rapid Test Installer.exeStatic PE information: certificate valid
Source: Rapid Test Installer.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\_work\1\s\src\StoreInstaller\obj\Release\net472\StoreInstaller.pdb source: Rapid Test Installer.exe
Source: Binary string: D:\a\_work\1\s\src\StoreInstaller\obj\Release\net472\StoreInstaller.pdbSHA256\u source: Rapid Test Installer.exe
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/StoreInstaller;component/Resources/StoreAppList.Light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/StoreInstaller;component/Resources/StoreLogo.Light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/StoreInstaller;component/Resources/Theme/Light.xaml
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/StoreInstaller;component/Resources/app.Light.ico
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://e12564.dspb.akamaiedge.net
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Resources/StoreAppList.Light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Resources/StoreLogo.Light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Resources/app.Light.ico
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/resources/app.light.ico
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/resources/storeapplist.light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/resources/storelogo.light.png
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/StoreInstaller.Models
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1225000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.oh
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B769A680_2_00007FFD9B769A68
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B77178E0_2_00007FFD9B77178E
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B772E390_2_00007FFD9B772E39
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B7623CA0_2_00007FFD9B7623CA
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B7703570_2_00007FFD9B770357
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B76A7D00_2_00007FFD9B76A7D0
Source: Rapid Test Installer.exeBinary or memory string: OriginalFilenameStoreInstaller.exe@ vs Rapid Test Installer.exe
Source: classification engineClassification label: clean4.winEXE@1/4@0/0
Source: C:\Users\user\Desktop\Rapid Test Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPFD9FC.tmpJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeMutant created: NULL
Source: C:\Users\user\Desktop\Rapid Test Installer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f6bec8ba-58ff-4dfc-9981-2ec5ebd23734}-9NBLGGH4SB5K
Source: C:\Users\user\Desktop\Rapid Test Installer.exeFile created: C:\Users\user\AppData\Local\Temp\TmpD3C0.tmpJump to behavior
Source: Rapid Test Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Rapid Test Installer.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Rapid Test Installer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Rapid Test Installer.exeString found in binary or memory: D:\a\_work\1\s\src\StoreInstaller\ViewModels\InstallViewModel.cs%UpdateProgressText)InstallationStarting-InstallationInProgress'ActionAnotherWindow%InstallationPaused=InstallationDownloadingPercent+InstallState.Canceled
Source: Rapid Test Installer.exeString found in binary or memory: 0.0-InstallState.Completed#WpmRebootRequired
Source: Rapid Test Installer.exeString found in binary or memory: 'Die App-Installation wurde abgebrochen.
Source: Rapid Test Installer.exeString found in binary or memory: I-install
Source: Rapid Test Installer.exeString found in binary or memory: Na-install
Source: Rapid Test Installer.exeString found in binary or memory: )Gusto mo bang kanselahin ang pag-install?
Source: Rapid Test Installer.exeString found in binary or memory: 'Hindi namin nakumpleto ang pag-install.
Source: Rapid Test Installer.exeString found in binary or memory: Kumpleto na ang pag-install
Source: Rapid Test Installer.exeString found in binary or memory: Ini-install
Source: Rapid Test Installer.exeString found in binary or memory: &Naka-install ang pinakabagong bersyon.
Source: Rapid Test Installer.exeString found in binary or memory: !Kinansela ang pag-install ng app.
Source: Rapid Test Installer.exeString found in binary or memory: 9Maaari mong i-restart ang pag-install o gawin ito mamaya.
Source: Rapid Test Installer.exeString found in binary or memory: FI-restart ang iyong PC para tapusin ang pag-install sa produktong ito.
Source: Rapid Test Installer.exeString found in binary or memory: App-Installatioun gouf ofgebrach.
Source: Rapid Test Installer.exeString found in binary or memory: ella l-installazzjoni?
Source: Rapid Test Installer.exeString found in binary or memory: %Ma stajniex inlestu l-installazzjoni.
Source: Rapid Test Installer.exeString found in binary or memory: L-installazzjoni lesta
Source: Rapid Test Installer.exeString found in binary or memory: -L-installazzjoni tal-app
Source: Rapid Test Installer.exeString found in binary or memory: tirristartja l-installazzjoni jew tag
Source: Rapid Test Installer.exeString found in binary or memory: ek biex tlesti l-installazzjoni ta
Source: Rapid Test Installer.exeString found in binary or memory: "De app-installatie is geannuleerd.
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wshext.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: esdsip.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ncryptprov.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: msctfui.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.web.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: installservice.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41945702-8302-44A6-9445-AC98E8AFA086}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Rapid Test Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Rapid Test Installer.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: Rapid Test Installer.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Rapid Test Installer.exeStatic file information: File size 1058336 > 1048576
Source: Rapid Test Installer.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Rapid Test Installer.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\_work\1\s\src\StoreInstaller\obj\Release\net472\StoreInstaller.pdb source: Rapid Test Installer.exe
Source: Binary string: D:\a\_work\1\s\src\StoreInstaller\obj\Release\net472\StoreInstaller.pdbSHA256\u source: Rapid Test Installer.exe
Source: Rapid Test Installer.exeStatic PE information: 0xD76DA577 [Thu Jul 13 00:40:23 2084 UTC]
Source: Rapid Test Installer.exeStatic PE information: real checksum: 0x10c5c5 should be: 0x10e4db
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B64D2A5 pushad ; iretd 0_2_00007FFD9B64D2A6
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B782B0C push eax; ret 0_2_00007FFD9B782B24
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B7829CC push eax; ret 0_2_00007FFD9B7829E4
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B7600BD pushad ; iretd 0_2_00007FFD9B7600C1
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B783658 push eax; ret 0_2_00007FFD9B783674
Source: C:\Users\user\Desktop\Rapid Test Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Rapid Test Installer.exe.logJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeMemory allocated: 214DF3C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeMemory allocated: 214F8E60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeCode function: 0_2_00007FFD9B773B91 sldt word ptr [eax-026477ADh]0_2_00007FFD9B773B91
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeWindow / User API: threadDelayed 661Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeWindow / User API: threadDelayed 611Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exe TID: 7768Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exe TID: 7792Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exe TID: 7596Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Rapid Test Installer.exe, 00000000.00000002.1719170436.00000214F95D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Rapid Test Installer.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Users\user\Desktop\Rapid Test Installer.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Globalization.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Controls.Ribbon\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Controls.Ribbon.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.WindowsRuntime\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.InteropServices.WindowsRuntime.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Data.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPFD9FC.tmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Rapid Test Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory42
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)42
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://foo/Resources/app.Light.ico0%Avira URL Cloudsafe
http://foo/bar/resources/app.light.ico0%Avira URL Cloudsafe
http://defaultcontainer/StoreInstaller;component/Resources/app.Light.ico0%Avira URL Cloudsafe
http://defaultcontainer/StoreInstaller;component/Resources/Theme/Light.xaml0%Avira URL Cloudsafe
http://foo/Resources/StoreLogo.Light.png0%Avira URL Cloudsafe
http://foo/bar/resources/storelogo.light.png0%Avira URL Cloudsafe
http://defaultcontainer/StoreInstaller;component/Resources/StoreLogo.Light.png0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://foo/Resources/app.Light.icoRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://foo/bar/resources/app.light.icoRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://defaultcontainer/StoreInstaller;component/Resources/app.Light.icoRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://defaultcontainer/StoreInstaller;component/Resources/Theme/Light.xamlRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E132A000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schemas.datacontract.org/Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://schemas.datacontract.orgRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://foo/Resources/StoreLogo.Light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.datacontract.org/2004/07/Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://foo/bar/resources/storeapplist.light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://schemas.datacontract.org/2004/07/StoreInstaller.ModelsRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://foo/Resources/StoreAppList.Light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://defaultcontainer/StoreInstaller;component/Resources/StoreAppList.Light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://foo/bar/resources/storelogo.light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://defaultcontainer/StoreInstaller;component/Resources/StoreLogo.Light.pngRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1151000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1225000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.w3.ohRapid Test Installer.exe, 00000000.00000002.1716655644.00000214E1403000.00000004.00000800.00020000.00000000.sdmp, Rapid Test Installer.exe, 00000000.00000002.1716655644.00000214E10CF000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1566410
                    Start date and time:2024-12-02 07:13:53 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 9s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Rapid Test Installer.exe
                    Detection:CLEAN
                    Classification:clean4.winEXE@1/4@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 81%
                    • Number of executed functions: 12
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 2.20.41.184
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, data-edge.smartscreen.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, nav.smartscreen.microsoft.com, fe3cr.delivery.mp.microsoft.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, login.live.com, store-images.s-microsoft.com, www.microsoft.com, livetileedge.dsx.mp.microsoft.com, storeedgefd.dsx.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Rapid Test Installer.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):4017
                    Entropy (8bit):5.365271649872934
                    Encrypted:false
                    SSDEEP:96:iqbYqGSI6ou/fmOYqSqtzHeqKksvoqdqZ4UqqI9m1RWQvqh:iqbYqGcn/uHqXtzHeqKksvoqdqZrqqxQ
                    MD5:5AE8E4F3A04541A6E49A025DC877C086
                    SHA1:7369D60293F7DEEC11B8181B5E527148CE7F2F5F
                    SHA-256:5262E4D29ECBC33479F0F64EC5F90AEC90055A3FC90DAAC8DDFAF7B30E5336B0
                    SHA-512:FDDCB3BE9DF19ABD547A53BE3F6202DFBDBD94A362EC5D03ECC083846E75467C54682C769F41B2E99D95CD49F6F662D03B2A890FC764765EE975172088BB8F88
                    Malicious:false
                    Reputation:low
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\WindowsBase\95a5c1baa004b986366d34856f0a5a75\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\PresentationCore\ef4e808cb158d79ab9a2b049f8fab733\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\Presentatio5ae0f00f#\
                    Process:C:\Users\user\Desktop\Rapid Test Installer.exe
                    File Type:PNG image data, 300 x 300, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):18702
                    Entropy (8bit):7.949942553430493
                    Encrypted:false
                    SSDEEP:384:/KMhxoA9mcXGKYQn13n3chuQnKCS6I3ToDGduPM5+u76hvJ9j:SMhGA9mRy1X3CEVZTdxx76d
                    MD5:5812EA7F5EC208B82B2DE1CBBA53EF92
                    SHA1:673B962F95831ADCBF67077AF23C3659FE53C2C1
                    SHA-256:74E97961E211D83A1C61DD1FD955EEBF993515B4D247FAB02C0A0D777F33187C
                    SHA-512:8DA1B2239F9EA09C7B47BDAD148D220D03637440BAD73F6011D72F0758BF9E629EE480239E3292C906802B71538279A11886E19D174599A2414E7C8D8D147382
                    Malicious:false
                    Reputation:low
                    Preview:.PNG........IHDR...,...,.....N.~G....gAMA......a.....PLTE.............. . 123<>@>ABU..@>>o..k."p,1{<B@@?FFFLNQMPRPNNPPOWWX\]`]aciWXa`_ffgkmqnqwpnnpopvwxz}.~..}.......%.+3.....#....$+.)5.3,.5:.%).+6.5(.79.:D.8D.;B.G3.JR.Yc.qu.CJ.IW.T\.FH.KQ.YD.VX.Ye.cR.js..... .-..$*.*3.5+.48.&(.,3.9(.6:....."./..-&.;B.<C.J..E7.Z9.C(.G8.Y).U6.j2.R..M+.b..n+.EG.LS.TE.TX.GI.NU.QD.VZ.\c.dW.fj.mu.po.v{.ef.kq.tl.xx.FH.JQ.WF.UW.M@.[Z.Y`.mP.hi.lr.ui.uv.hg.ms.xk.zw.~..~..z..|..}..}..-.~.N.i.y.c.v.j.y..n.s..W.p.........................................................................................................................................................................................................................................................................tRNS...................................................................................................................................................................
                    Process:C:\Users\user\Desktop\Rapid Test Installer.exe
                    File Type:ASCII text, with very long lines (1136), with no line terminators
                    Category:dropped
                    Size (bytes):1136
                    Entropy (8bit):5.884313058724772
                    Encrypted:false
                    SSDEEP:24:QmeWUJxBiiAFaUlbJ2Hr1mI+Ic2iFerfnmj6BmKHnsZu:ZeX/ZkXgHr1m52iwrPvQInsZu
                    MD5:A10F31FA140F2608FF150125F3687920
                    SHA1:EC411CC7005AAA8E3775CF105FCD4E1239F8ED4B
                    SHA-256:28C871238311D40287C51DC09AEE6510CAC5306329981777071600B1112286C6
                    SHA-512:CF915FB34CD5ECFBD6B25171D6E0D3D09AF2597EDF29F9F24FA474685D4C5EC9BC742ADE9F29ABAC457DD645EE955B1914A635C90AF77C519D2ADA895E7ECF12
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:MIIDUDCCAjigAwIBAgIQImsjBGfFTk6M7sZzNVcAwDANBgkqhkiG9w0BAQsFADAlMSMwIQYDVQQDExphdXRoLmluc3RhbGxlcnNlcnZpY2VzLmNvbTAeFw0yMzEwMjUyMzEzNDhaFw0yODEwMjUyMzIzNDhaMCUxIzAhBgNVBAMTGmF1dGguaW5zdGFsbGVyc2VydmljZXMuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwnTHlqfx0MmiBSvhwkjmo2Y53B2ED6kyYgNgsSoX090DwL9g08Q2LnfEEFH+mif1Zv6jztT5QvWXjjroucDJQzZFBz/xbd1zilX80JFxD/8TIiKdmg73eXcrkSTsQUz97HwnpZbQDWbQJh/QxbvRIrJrcU2ADGsC5KBpRVXJ3t9m3TKNrfbAtKpPonso6+6GHvwUNTZUU9UgvDV3qGpDSniqumK3a1U9hphJJBb8us3o3538CM3tJAJ2w/bDGA/MOaTInkspZIQpecv16wkMWuLyHUxAaMDIO0tuIKxeIka0PaTAaZdw6BXofnNqwDD5JloOGm323JAR3pe+hJmSmQIDAQABo3wwejAOBgNVHQ8BAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUL8Xv6MyxPZ8/T+cj4fEkfSpVzqEwHQYDVR0OBBYEFC/F7+jMsT2fP0/nI+HxJH0qVc6hMA0GCSqGSIb3DQEBCwUAA4IBAQASgm1VIK9vC88LPaCv7qPEd2TUtRrOi/VG2HkcpmBIKGoDeFa41jzKpO25iMg4MQhlXuljIYMDch8YpZETcFvBXHzfCF7Rc+kl/K5tFd8kHGMItiPuwZV/BfvL9Wu4gY4g1skfRpiemP1gZvlc1fZlEoYDqAIzODkRyXOd2nsa7zt8iGTdNujZ8A/IyQzGNeqtmt+bpNvKojkB
                    Process:C:\Users\user\Desktop\Rapid Test Installer.exe
                    File Type:ASCII text, with very long lines (1136), with no line terminators
                    Category:dropped
                    Size (bytes):1136
                    Entropy (8bit):5.884313058724772
                    Encrypted:false
                    SSDEEP:24:QmeWUJxBiiAFaUlbJ2Hr1mI+Ic2iFerfnmj6BmKHnsZu:ZeX/ZkXgHr1m52iwrPvQInsZu
                    MD5:A10F31FA140F2608FF150125F3687920
                    SHA1:EC411CC7005AAA8E3775CF105FCD4E1239F8ED4B
                    SHA-256:28C871238311D40287C51DC09AEE6510CAC5306329981777071600B1112286C6
                    SHA-512:CF915FB34CD5ECFBD6B25171D6E0D3D09AF2597EDF29F9F24FA474685D4C5EC9BC742ADE9F29ABAC457DD645EE955B1914A635C90AF77C519D2ADA895E7ECF12
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:MIIDUDCCAjigAwIBAgIQImsjBGfFTk6M7sZzNVcAwDANBgkqhkiG9w0BAQsFADAlMSMwIQYDVQQDExphdXRoLmluc3RhbGxlcnNlcnZpY2VzLmNvbTAeFw0yMzEwMjUyMzEzNDhaFw0yODEwMjUyMzIzNDhaMCUxIzAhBgNVBAMTGmF1dGguaW5zdGFsbGVyc2VydmljZXMuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwnTHlqfx0MmiBSvhwkjmo2Y53B2ED6kyYgNgsSoX090DwL9g08Q2LnfEEFH+mif1Zv6jztT5QvWXjjroucDJQzZFBz/xbd1zilX80JFxD/8TIiKdmg73eXcrkSTsQUz97HwnpZbQDWbQJh/QxbvRIrJrcU2ADGsC5KBpRVXJ3t9m3TKNrfbAtKpPonso6+6GHvwUNTZUU9UgvDV3qGpDSniqumK3a1U9hphJJBb8us3o3538CM3tJAJ2w/bDGA/MOaTInkspZIQpecv16wkMWuLyHUxAaMDIO0tuIKxeIka0PaTAaZdw6BXofnNqwDD5JloOGm323JAR3pe+hJmSmQIDAQABo3wwejAOBgNVHQ8BAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUL8Xv6MyxPZ8/T+cj4fEkfSpVzqEwHQYDVR0OBBYEFC/F7+jMsT2fP0/nI+HxJH0qVc6hMA0GCSqGSIb3DQEBCwUAA4IBAQASgm1VIK9vC88LPaCv7qPEd2TUtRrOi/VG2HkcpmBIKGoDeFa41jzKpO25iMg4MQhlXuljIYMDch8YpZETcFvBXHzfCF7Rc+kl/K5tFd8kHGMItiPuwZV/BfvL9Wu4gY4g1skfRpiemP1gZvlc1fZlEoYDqAIzODkRyXOd2nsa7zt8iGTdNujZ8A/IyQzGNeqtmt+bpNvKojkB
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.824857361033762
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    • Win32 Executable (generic) a (10002005/4) 49.97%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:Rapid Test Installer.exe
                    File size:1'058'336 bytes
                    MD5:f74ab47d148fa2bbdc50849a32837952
                    SHA1:869aacf8b648e248a9e2594c74df11733281f4e6
                    SHA256:dc4d5e282b26d18a7c78807e0152cc79c3fc5d2f1f33e78e4d1da7d5f8e58375
                    SHA512:9d2e36a11a97f80d2a19aa519a718e7548c4007df73747adb628cc7b6cf8a29b88493b989dfbd31ace1622f230ef385895dbddbbb8bf9a19abed61408e7e28ec
                    SSDEEP:12288:qvUGQWpy+Tac0RDffXJjyYpcyoNHSy5viczPESsQ3BaE32VfXJjyYpz:lGQB+2DR7BWYpcyo44u0aPVBWYpz
                    TLSH:25354C9123FC4439E7B70B39BD7A58610735BC395942E5AE098E293C18F2B1689F2737
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...w.m..........."...0......(........... ........@.. ....................... ............`................................
                    Icon Hash:136cb2b27171b24d
                    Entrypoint:0x4ea89e
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xD76DA577 [Thu Jul 13 00:40:23 2084 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Signature Valid:true
                    Signature Issuer:CN=Microsoft Marketplace CA G 027, OU=EOC, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                    Signature Validation Error:The operation completed successfully
                    Error Number:0
                    Not Before, Not After
                    • 13/09/2024 01:07:32 16/09/2024 01:07:32
                    Subject Chain
                    • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                    Version:3
                    Thumbprint MD5:F5B7BCC826B78AEF763836D82EF67DBA
                    Thumbprint SHA-1:FDA943641AAA87F7EA61F7347FE92B9C3ABC3825
                    Thumbprint SHA-256:51B79453AFF83A66E1EC1E1139143AAB93E8BC7D4E00E922857DEAE48B2F0543
                    Serial:33003E3B13F845F76C76D487AB0001003E3B13
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xea84b0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x12520.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0xfb4000x7220
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xea7700x54.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xe88a40xe8a005b6a3efd8eac820346aff8b482a10019False0.4117619895217625data6.750490375633941IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xec0000x125200x126009ea49324b516aa5d1561d31d950be75cFalse0.9542410714285714data7.935620731794472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1000000xc0x2002489e7acd7e3729bd40ae5f145668c14False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xec1e00xd5e7PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0004748077941525
                    RT_ICON0xf97d80x1363PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced1.0022164013701391
                    RT_ICON0xfab4c0xc9dPNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced1.0034066274388356
                    RT_ICON0xfb7fc0x9daPNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced1.0043616177636796
                    RT_ICON0xfc1e80x691PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.006543723973825
                    RT_ICON0xfc88c0x490PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced1.009417808219178
                    RT_ICON0xfcd2c0x396PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0119825708061003
                    RT_ICON0xfd0d40x299PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced1.0165413533834586
                    RT_GROUP_ICON0xfd3800x76data0.7542372881355932
                    RT_VERSION0xfd4080x3e0data0.4284274193548387
                    RT_MANIFEST0xfd7f80xd21XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3924427253793514
                    DLLImport
                    mscoree.dll_CorExeMain
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:01:14:42
                    Start date:02/12/2024
                    Path:C:\Users\user\Desktop\Rapid Test Installer.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\Rapid Test Installer.exe"
                    Imagebase:0x214def90000
                    File size:1'058'336 bytes
                    MD5 hash:F74AB47D148FA2BBDC50849A32837952
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:9.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:3
                      Total number of Limit Nodes:0
                      execution_graph 22796 7ffd9b760fa8 22797 7ffd9b760fb1 K32EnumProcessModules 22796->22797 22799 7ffd9b761072 22797->22799
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID: qN_H
                      • API String ID: 0-3454480406
                      • Opcode ID: affa5dd355deaf00b81ec54e641510cddaf5057bcb8d2da4ffe087b6ab3e1467
                      • Instruction ID: e94b79649043a98cf5260585f2d7a294228fbcebd41f9c69e4e9013f65883f14
                      • Opcode Fuzzy Hash: affa5dd355deaf00b81ec54e641510cddaf5057bcb8d2da4ffe087b6ab3e1467
                      • Instruction Fuzzy Hash: D1231A62E0EB8E8FE779966448732B43BD0DF56310F0602B9D45DC76F3ED186A0A8752
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID: qN_H
                      • API String ID: 0-3454480406
                      • Opcode ID: ff030a75bec7a65dfb048ade5fb10659ef88ce793ff3cd3ce5e513518a68856c
                      • Instruction ID: c6c027e59ac7ca955746c37bcfcd861b2aac25a4c8c3c6cde6a5c0c1f35d0059
                      • Opcode Fuzzy Hash: ff030a75bec7a65dfb048ade5fb10659ef88ce793ff3cd3ce5e513518a68856c
                      • Instruction Fuzzy Hash: 0FE21B72A1DB898FD379976884632B43BD1EF5A310B0502FDD45DCB6F3DD28A9068742

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1355 7ffd9b77178e-7ffd9b7717d9 1357 7ffd9b7717da-7ffd9b771821 1355->1357 1363 7ffd9b771823-7ffd9b7718fe 1357->1363 1379 7ffd9b771905-7ffd9b77195a 1363->1379 1385 7ffd9b77195c-7ffd9b771a20 1379->1385 1399 7ffd9b771a21-7ffd9b771a70 1385->1399 1408 7ffd9b771a72-7ffd9b771b26 1399->1408 1426 7ffd9b771b29-7ffd9b771b5e 1408->1426 1432 7ffd9b771b60-7ffd9b771b70 1426->1432 1432->1426 1434 7ffd9b771b72 1432->1434 1435 7ffd9b771b74-7ffd9b771bb8 1434->1435 1441 7ffd9b771bba-7ffd9b771bd9 1435->1441 1441->1432 1443 7ffd9b771bdb-7ffd9b771be8 1441->1443 1445 7ffd9b771c32-7ffd9b771c3f 1443->1445 1446 7ffd9b771bea-7ffd9b771c06 1443->1446 1447 7ffd9b771c5f-7ffd9b771c6c 1445->1447 1446->1447 1448 7ffd9b771c08-7ffd9b771c0b 1446->1448 1451 7ffd9b771c6e-7ffd9b771c89 1447->1451 1452 7ffd9b771cb6 1447->1452 1449 7ffd9b771c0d-7ffd9b771c29 call 7ffd9b770c70 1448->1449 1450 7ffd9b771c8c-7ffd9b771c99 1448->1450 1459 7ffd9b771c2e-7ffd9b771c2f 1449->1459 1455 7ffd9b771cf2-7ffd9b771cf6 1450->1455 1456 7ffd9b771c9b-7ffd9b771c9e 1450->1456 1451->1450 1457 7ffd9b771cf8-7ffd9b771cfb 1452->1457 1458 7ffd9b771cb8-7ffd9b771cbb 1452->1458 1455->1457 1460 7ffd9b771d1f-7ffd9b771d22 1456->1460 1461 7ffd9b771ca0-7ffd9b771ca2 1456->1461 1462 7ffd9b771cfd-7ffd9b771d1d 1457->1462 1463 7ffd9b771d45-7ffd9b771d73 1457->1463 1464 7ffd9b771cbd-7ffd9b771cdb call 7ffd9b770c50 1458->1464 1465 7ffd9b771d3c-7ffd9b771d3d 1458->1465 1459->1445 1466 7ffd9b771d24-7ffd9b771d29 1460->1466 1467 7ffd9b771ca4 1461->1467 1468 7ffd9b771d1e 1461->1468 1477 7ffd9b771d76-7ffd9b771d7f 1463->1477 1509 7ffd9b771ce0-7ffd9b771cf1 call 7ffd9b771cf2 1464->1509 1469 7ffd9b771d3f 1465->1469 1470 7ffd9b771d40-7ffd9b771d43 1465->1470 1474 7ffd9b771d2a-7ffd9b771d2b 1466->1474 1475 7ffd9b771ce6-7ffd9b771ceb 1467->1475 1476 7ffd9b771ca6-7ffd9b771ca8 1467->1476 1468->1460 1469->1470 1470->1463 1478 7ffd9b771d2d 1474->1478 1479 7ffd9b771d2e 1474->1479 1481 7ffd9b771cec-7ffd9b771cf1 1475->1481 1476->1466 1480 7ffd9b771caa 1476->1480 1482 7ffd9b771e6b-7ffd9b771e8a 1477->1482 1483 7ffd9b771d85-7ffd9b771d88 1477->1483 1478->1479 1488 7ffd9b771d30-7ffd9b771d3a 1479->1488 1480->1481 1489 7ffd9b771cac-7ffd9b771cae 1480->1489 1487 7ffd9b771e91-7ffd9b771ea2 1482->1487 1484 7ffd9b771d8e-7ffd9b771d9e 1483->1484 1485 7ffd9b771eaa-7ffd9b771ead 1483->1485 1490 7ffd9b771da0-7ffd9b771da4 1484->1490 1491 7ffd9b771da6 1484->1491 1493 7ffd9b771f12-7ffd9b771f2c 1485->1493 1494 7ffd9b771eaf-7ffd9b771ed4 call 7ffd9b763b98 1485->1494 1487->1485 1492 7ffd9b771ea4-7ffd9b771ea9 1487->1492 1488->1465 1489->1474 1495 7ffd9b771cb0 1489->1495 1496 7ffd9b771da8-7ffd9b771daa 1490->1496 1491->1496 1492->1485 1497 7ffd9b771f33-7ffd9b771f44 1493->1497 1494->1497 1510 7ffd9b771ed6-7ffd9b771f0d call 7ffd9b770c90 1494->1510 1495->1455 1500 7ffd9b771cb2-7ffd9b771cb4 1495->1500 1501 7ffd9b771db0-7ffd9b771dbb 1496->1501 1502 7ffd9b771f4d 1496->1502 1503 7ffd9b771f54-7ffd9b771f8b 1497->1503 1504 7ffd9b771f46-7ffd9b771f4b 1497->1504 1500->1452 1500->1488 1511 7ffd9b771dc4-7ffd9b771de7 1501->1511 1512 7ffd9b771dbd-7ffd9b771dc3 1501->1512 1502->1503 1520 7ffd9b771f92-7ffd9b771f9b 1503->1520 1504->1503 1510->1520 1511->1477 1523 7ffd9b771de9-7ffd9b771e2f 1511->1523 1512->1511 1523->1487 1526 7ffd9b771e31-7ffd9b771e61 call 7ffd9b770c90 1523->1526 1529 7ffd9b771e66 1526->1529 1529->1520
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID: *N_^
                      • API String ID: 0-624889316
                      • Opcode ID: 2133e07fc0d7163f70622d66dc89ec368870ebfd6d638531a1c675062c945d1b
                      • Instruction ID: 09d6f848838a645913c7b33684b3a6851e6ba9cf350d8607d8dc0e34c3943e72
                      • Opcode Fuzzy Hash: 2133e07fc0d7163f70622d66dc89ec368870ebfd6d638531a1c675062c945d1b
                      • Instruction Fuzzy Hash: C7524C32A0E7994FD715EB7C98B15E93BA1EF52324B0902F7D099CB0E3DE286946C741
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 005656c421bb233af715f1429f874a998f8071af9d76d203dcbe8e5a6679a007
                      • Instruction ID: 68a755a8e63bedd3638256798b8128b118f048b29c117cc9545dfbfe4a0471c5
                      • Opcode Fuzzy Hash: 005656c421bb233af715f1429f874a998f8071af9d76d203dcbe8e5a6679a007
                      • Instruction Fuzzy Hash: AEE13731B0EB4D4FE7A4DB6884A166577E1FF9A310F0601BED04DC72F2DA64AE418752

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1883 7ffd9b760fa8-7ffd9b760faf 1884 7ffd9b760fb1-7ffd9b760fb9 1883->1884 1885 7ffd9b760fba-7ffd9b761070 K32EnumProcessModules 1883->1885 1884->1885 1889 7ffd9b761072 1885->1889 1890 7ffd9b761078-7ffd9b7610a7 1885->1890 1889->1890
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID: EnumModulesProcess
                      • String ID:
                      • API String ID: 1082081703-0
                      • Opcode ID: 0ad418c6d7fa97b85871b938732052cc10fd02ed1525cb3d53ca399373254c80
                      • Instruction ID: 330cc642fa01c17a964217aa392acf09eb785bf874e7daec34c357b18b33d4d8
                      • Opcode Fuzzy Hash: 0ad418c6d7fa97b85871b938732052cc10fd02ed1525cb3d53ca399373254c80
                      • Instruction Fuzzy Hash: DF31D431A0CB4C8FDB18DB989846AF9BBE1EF55321F04426FD049D3292CB746856CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 79ec2524b427deb2cbee7f8ee529593bceec77442a9fa642f5e18f7a45090e37
                      • Instruction ID: 652dc3d6fcdf0a31fef449b5cedc64dbbadb50ca1b446c11707478c00819e36f
                      • Opcode Fuzzy Hash: 79ec2524b427deb2cbee7f8ee529593bceec77442a9fa642f5e18f7a45090e37
                      • Instruction Fuzzy Hash: B722C430B1EA494FEB69DB6C84A5A7477D1EF5A314F1501BAE04EC72E3DE24AC42C781
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91aaa75c822f6c25c850d96cc1e5fe0189a6e433bb8f8adbbaabb5761f4929e0
                      • Instruction ID: b21837efff19e79ae6d89237623407af93a09a1e3f27541828a024693e70d978
                      • Opcode Fuzzy Hash: 91aaa75c822f6c25c850d96cc1e5fe0189a6e433bb8f8adbbaabb5761f4929e0
                      • Instruction Fuzzy Hash: 4CD1D33070DA494FEB58AB6C84A5B7577D2EF9A314F4401BED04EC76E7DE24A842C781
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 18c7c22fbbfa835152670c08381f1a10789d2158fee07f5136cb6740ea3fd1eb
                      • Instruction ID: 1a7e7967b3cd734c39adad006fa58d7bfb999937c0e79bd3563f2b4465ce9398
                      • Opcode Fuzzy Hash: 18c7c22fbbfa835152670c08381f1a10789d2158fee07f5136cb6740ea3fd1eb
                      • Instruction Fuzzy Hash: C861E771B1EA494FEB94DB2C84A59357BD2FFA8744B1501BEE04DC72E2DE24E8419701
                      Memory Dump Source
                      • Source File: 00000000.00000002.1721477175.00007FFD9B64D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B64D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b64d000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd21df304aef370a51aa6e9a05ba199d5e630acce6e89ec739354be747781105
                      • Instruction ID: c71827dc5f31079ff1d27c60dc810222a86027fb9a9ae827838ca5dd6b580631
                      • Opcode Fuzzy Hash: bd21df304aef370a51aa6e9a05ba199d5e630acce6e89ec739354be747781105
                      • Instruction Fuzzy Hash: 6F41043160EBC44FE76A8B389855A623FF1EF56210B1506EFD0C8CB1A3D625B846C792
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf0c19be5ecf417bd55d95b3a0e22578954c3c223339ff1345adbe98983e39d7
                      • Instruction ID: d10233eb54a82627e9ab60f69c4f97c1877591afd03ba492d3aa4299cc8f69c1
                      • Opcode Fuzzy Hash: cf0c19be5ecf417bd55d95b3a0e22578954c3c223339ff1345adbe98983e39d7
                      • Instruction Fuzzy Hash: 62217971A1FAC98FEBA5CB2C84A56297FD0EF69754B1900FEE08AC71F2D915A801C701
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3bbeb572c6093ffe11b1f481b7afbc33acb872a149ad3a29c9561f686b8e9cea
                      • Instruction ID: e0de331b702087644ed6ed00490e0a1c48e458554463706d8a3e61ee8ab905b2
                      • Opcode Fuzzy Hash: 3bbeb572c6093ffe11b1f481b7afbc33acb872a149ad3a29c9561f686b8e9cea
                      • Instruction Fuzzy Hash: C021B671A2DA494FEBA4DB2884B56753BD1EF6D700B0501BDE48EC72F2DE24AD019701
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722956671.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b870000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c37d651ae16ab26a5ed2e3599fe73f65f91ac92bcb2f9330f980303277812e09
                      • Instruction ID: e7a08603c1ac1e22b0c55c7483be3ca9db0e6e3ec5b5181c7cdb7059dd16af17
                      • Opcode Fuzzy Hash: c37d651ae16ab26a5ed2e3599fe73f65f91ac92bcb2f9330f980303277812e09
                      • Instruction Fuzzy Hash: 8B212962B2DA854FDB64CB7C84B56A43BD0EF6A714B0501FED09DCB2F3CD2458059351
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: dffc003ba1b4881f743a8827de03e1ecfc37607bfd94618b6a93b85016c191bd
                      • Instruction ID: ca695984c584cb71de147bc8004f5c7b10c01b8248082dd9e35f84a17df4149e
                      • Opcode Fuzzy Hash: dffc003ba1b4881f743a8827de03e1ecfc37607bfd94618b6a93b85016c191bd
                      • Instruction Fuzzy Hash: 7D32AD25B5E3894FE72D8A2848A20B977D1EF92714F1903BDD4DBC71A3ED68A50387C1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID: =m[I
                      • API String ID: 0-893770424
                      • Opcode ID: 2424b55283a84e8f630841e54c3a563c9743f38d8048ebc7d57a4c6d45f6f8ab
                      • Instruction ID: d68b05ec4cd3f24118fe3637a219080034a0790d511f7bc06c640dce975d0c44
                      • Opcode Fuzzy Hash: 2424b55283a84e8f630841e54c3a563c9743f38d8048ebc7d57a4c6d45f6f8ab
                      • Instruction Fuzzy Hash: 3652D657B0F7D78FE7A256BD58B50E43F50EF9266571A02FBC0D48E0F3A904690A8362
                      Memory Dump Source
                      • Source File: 00000000.00000002.1722079292.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ffd9b760000_Rapid Test Installer.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a7ccff6a02313927d7346e316646cf0546f45b362f9f35becd0125f38afc295
                      • Instruction ID: 80c4d6748a049e77712d487db568fa17146ae6591247ba911e7ce88d7beefa8e
                      • Opcode Fuzzy Hash: 2a7ccff6a02313927d7346e316646cf0546f45b362f9f35becd0125f38afc295
                      • Instruction Fuzzy Hash: 9141831BA4E3E24EE31673BC68B24F97FA18F1223970C41F7E0ED494E79D08508987A5