Click to jump to signature section
Source: Setup.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: Setup.exe | Static PE information: certificate valid |
Source: Setup.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: inetc.dll.1.dr |
Source: Joe Sandbox View | IP Address: 161.35.127.181 161.35.127.181 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /pixel.gif?guid=B85E4D56-FE7F-05B2-0505-26A7EDB43680&_fcid=&evt_src=installer&evt_action=show_page&version=2.353&page=wel HTTP/1.1User-Agent: NSIS_Inetc (Mozilla)Host: veryfast.ioConnection: Keep-AliveCache-Control: no-cache |
Source: global traffic | DNS traffic detected: DNS query: veryfast.io |
Source: unknown | HTTP traffic detected: POST /inst_cpg.php?src=fast_mini&guid=B85E4D56-FE7F-05B2-0505-26A7EDB43680&_fcid=&version=2.353&uc=16le HTTP/1.1Content-Type: application/jsonUser-Agent: NSIS_wininetHost: veryfast.ioContent-Length: 3186Cache-Control: no-cache |
Source: Setup.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: Setup.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0 |
Source: Setup.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: Setup.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Setup.exe, 00000001.00000002.12154458930.0000000003DE1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: Setup.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: Setup.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S |
Source: Setup.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: Setup.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Setup.exe | String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0 |
Source: Setup.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Setup.exe | String found in binary or memory: http://ocsp.digicert.com0 |
Source: Setup.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: Setup.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: Setup.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: Setup.exe | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: Setup.exe, 00000001.00000002.12154458930.0000000003DE1000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/ |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/?p=lp_veryfast_privacy_r1&guid=0x408 |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/?p=lp_veryfast_tos_r1&guid= |
Source: Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/X |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/download.php?engine=1&guid= |
Source: Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/inst_cpg.php?src=fast_mini&guid=B85E4D56-FE7F-05B2-0505-26A7EDB43680&_fcid=&vers |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/installing.html?guid= |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/pixel.gif?guid= |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000794000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/pixel.gif?guid=&version=&evt_src=installer&evt_action=cancel |
Source: Setup.exe, 00000001.00000002.12153300391.0000000000816000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://veryfast.io/pixel.gif?guid=B85E4D56-FE7F-05B2-0505-26A7EDB43680&_fcid=&evt_src=installer&evt |
Source: unknown | Network traffic detected: HTTP traffic on port 49748 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49747 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49748 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49747 |
Source: Setup.exe, 00000001.00000002.12155504514.000000006C207000.00000002.00000001.01000000.00000009.sdmp | Binary or memory string: OriginalFilenamensJSON.dllH vs Setup.exe |
Source: Setup.exe, 00000001.00000002.12155184432.000000001001B000.00000002.00000001.01000000.0000000C.sdmp | Binary or memory string: OriginalFilenameGraphicalInstaller.dllX vs Setup.exe |
Source: Setup.exe, 00000001.00000002.12152933698.0000000000416000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameGraphicalInstaller.dllX vs Setup.exe |
Source: Setup.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: classification engine | Classification label: mal52.evad.winEXE@1/14@1/1 |
Source: Setup.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor |
Source: Setup.exe | Virustotal: Detection: 20% |
Source: Setup.exe | ReversingLabs: Detection: 34% |
Source: Setup.exe | String found in binary or memory: www.graphical-installer.com |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: acgenral.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: cfgmgr32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: asycfilt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Section loaded: virtdisk.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 | Jump to behavior |
Source: Setup.exe | Static PE information: certificate valid |
Source: Setup.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: inetc.dll.1.dr |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\nsJSON.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\Math.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\inetc.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\Banner.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\GraphicalInstaller.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\nsDialogs.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | File created: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\nsJSON.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\Math.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\inetc.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\Banner.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\GraphicalInstaller.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\nsDialogs.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvF50.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor |
Source: Setup.exe, 00000001.00000003.11857955280.000000000081E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware, Inc. |
Source: Setup.exe, 00000001.00000002.12153300391.000000000084E000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Setup.exe, 00000001.00000002.12154458930.0000000003DA9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWf |
Source: Setup.exe, 00000001.00000003.11857430264.000000000081C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMware%2C+Inc%2E |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct |
Source: C:\Users\user\Desktop\Setup.exe | WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct |