Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MagicUtilities-Setup-3.1.4.5-Win10.exe

Overview

General Information

Sample name:MagicUtilities-Setup-3.1.4.5-Win10.exe
Analysis ID:1522465
MD5:b0a4144c3aeef5d61201706e2f786ff0
SHA1:224e8360830c2b02e4daef69a2c0d55a98ff0ec4
SHA256:4150d4963e9283e26e1bbe67f56c733feec94ae4cc42b2e5fc35b40efa92ea8f
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Changes security center settings (notifications, updates, antivirus, firewall)
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction (VM detection)
Yara detected Generic Downloader
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Drops PE files
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses taskkill to terminate processes

Classification

  • System is w10x64_ra
  • svchost.exe (PID: 3508 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • MagicUtilities-Setup-3.1.4.5-Win10.exe (PID: 6940 cmdline: "C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe" MD5: B0A4144C3AEEF5D61201706E2F786FF0)
    • MagicUtilities-Setup-3.1.4.5-Win10.tmp (PID: 7008 cmdline: "C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp" /SL5="$80380,68291663,1056768,C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe" MD5: 9D13CC54CB881EF523EEA84C934A8AD1)
      • taskkill.exe (PID: 6504 cmdline: "C:\Windows\system32\taskkill.exe" /f /im AppleControlPanel.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
        • conhost.exe (PID: 6532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • _setup64.tmp (PID: 5860 cmdline: helper 105 0x5A4 MD5: E4211D6D009757C078A9FAC7FF4F03D4)
        • conhost.exe (PID: 5444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • DriverUnInstaller.exe (PID: 4532 cmdline: "C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe" --install=MagicMouse.inf --force MD5: 485E377D92A45B8BDE1C9930355D0722)
        • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • MagicMouseUtilities.exe (PID: 5552 cmdline: "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart MD5: 4D6F565A8A5174231351A1EE978FC5E5)
      • MagicMouseUtilities.exe (PID: 7076 cmdline: "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart MD5: 4D6F565A8A5174231351A1EE978FC5E5)
  • svchost.exe (PID: 6804 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7156 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 6008 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 5948 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 3292 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 6056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6564 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 5964 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • drvinst.exe (PID: 2920 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8e7b30d9-a74e-2c41-9648-e2741c677ffb}\MagicMouse.inf" "9" "4ba711867" "0000000000000144" "WinSta0\Default" "0000000000000170" "208" "C:\Program Files (x86)\MagicUtilities\DriverMouse" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • MagicUtilities_Service.exe (PID: 2216 cmdline: "C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exe" --run MD5: 607CED1B8039E03E85B8C0476E9F8988)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 3508, ProcessName: svchost.exe
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: certificate valid
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

        Networking

        barindex
        Source: Yara matchFile source: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmp, type: DROPPED
        Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{09dc9bae-bd3c-5743-b5d1-99df04016a9f}
        Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\magicmouse.inf_amd64_2697dabe43c1f96e
        Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
        Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.inf
        Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
        Source: C:\Windows\System32\drvinst.exeFile deleted: C:\Windows\System32\DriverStore\Temp\{09dc9bae-bd3c-5743-b5d1-99df04016a9f}\SETA38C.tmp
        Source: C:\Windows\System32\svchost.exeProcess token adjusted: Security
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal72.troj.evad.winEXE@28/17@0/18
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Program Files (x86)\MagicUtilities
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Users\user\AppData\Local\Programs
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5444:120:WilError_03
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -1862932489--1742674988. Number: 0
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6532:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5640:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6056:120:WilError_03
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeFile created: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "AppleControlPanel.exe")
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="KBOSD.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWCC.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.SCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AWGameLibrary.UCSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Process Where Name="AlienFXSubAgent.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile read: C:\Program Files (x86)\desktop.ini
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeFile read: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe
        Source: unknownProcess created: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe "C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe"
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeProcess created: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp "C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp" /SL5="$80380,68291663,1056768,C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe"
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeProcess created: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp "C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp" /SL5="$80380,68291663,1056768,C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im AppleControlPanel.exe
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmp helper 105 0x5A4
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmpProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe "C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe" --install=MagicMouse.inf --force
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im AppleControlPanel.exe
        Source: unknownProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8e7b30d9-a74e-2c41-9648-e2741c677ffb}\MagicMouse.inf" "9" "4ba711867" "0000000000000144" "WinSta0\Default" "0000000000000170" "208" "C:\Program Files (x86)\MagicUtilities\DriverMouse"
        Source: unknownProcess created: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exe "C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exe" --run
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmp helper 105 0x5A4
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe "C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe" --install=MagicMouse.inf --force
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
        Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{8e7b30d9-a74e-2c41-9648-e2741c677ffb}\MagicMouse.inf" "9" "4ba711867" "0000000000000144" "WinSta0\Default" "0000000000000170" "208" "C:\Program Files (x86)\MagicUtilities\DriverMouse"
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeSection loaded: version.dll
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeSection loaded: netapi32.dll
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeSection loaded: netutils.dll
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeSection loaded: apphelp.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: mpr.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: netapi32.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: winhttp.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: netutils.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wtsapi32.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: winsta.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: textinputframework.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: coreuicomponents.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: coremessaging.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: ntmarta.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wintypes.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wintypes.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wintypes.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: shfolder.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: rstrtmgr.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: ncrypt.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: ntasn1.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: textshaping.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: msftedit.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: windows.globalization.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: bcp47langs.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: bcp47mrm.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: globinputhost.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: dwmapi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: windows.ui.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: windowmanagementapi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: inputhost.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: propsys.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: twinapi.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: twinapi.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: msimg32.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: wbemcomn.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: sxs.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: amsi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: userenv.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: explorerframe.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: sspicli.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: sfc.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: sfc_os.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dll
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: linkinfo.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: ntshrui.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: srvcli.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: cscapi.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: apphelp.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmpSection loaded: ntmarta.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: newdev.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: devobj.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: devrtl.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: drvsetup.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: drvstore.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: cabinet.dll
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: edputil.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: urlmon.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: iertutil.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: windows.staterepositoryps.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: appresolver.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: slc.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: sppc.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: onecorecommonproxystub.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: onecoreuapcommonproxystub.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpSection loaded: pcacli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: umpnpmgr.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: apphelp.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: version.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: newdev.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: devobj.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: devrtl.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: windows.storage.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: wldp.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: profapi.dll
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSection loaded: kernel.appcore.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: version.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: winmm.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: powrprof.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: devobj.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: umpdc.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: shfolder.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: uxtheme.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: sspicli.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: windows.storage.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: wldp.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: profapi.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: kernel.appcore.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: textinputframework.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: coreuicomponents.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: coremessaging.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: ntmarta.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: wintypes.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: wintypes.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: wintypes.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: wbemcomn.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: sxs.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: amsi.dll
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSection loaded: userenv.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile written: C:\ProgramData\MagicUtilities\MagicUtilities.ini
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpWindow found: window name: TMainForm
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLL
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: certificate valid
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic file information: File size 69423208 > 1048576
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: MagicUtilities-Setup-3.1.4.5-Win10.exeStatic PE information: section name: .didata
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmpJump to dropped file
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeFile created: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\Program Files (x86)\MagicUtilities\Service\is-IEGHA.tmpJump to dropped file
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\MagicUtilities_Service
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Magic Mouse Utilities.lnk

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeMemory written: PID: 2216 base: 7FFF4F430008 value: E9 EB D9 E9 FF
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeMemory written: PID: 2216 base: 7FFF4F2CD9F0 value: E9 20 26 16 00
        Source: C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSystem information queried: FirmwareTableInformation
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSystem information queried: FirmwareTableInformation
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeSystem information queried: FirmwareTableInformation
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeSpecial instruction interceptor: First address: 1007C4E4A instructions rdtsc caused by: RDTSC with Trap Flag (TF)
        Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWindow / User API: threadDelayed 577
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWindow / User API: threadDelayed 5070
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpDropped PE file which has not been started: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Windows\System32\svchost.exe TID: 6284Thread sleep time: -30000s >= -30000s
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 7164Thread sleep count: 577 > 30
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 1508Thread sleep count: 218 > 30
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 6016Thread sleep count: 41 > 30
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 6016Thread sleep time: -41000s >= -30000s
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 6016Thread sleep count: 5070 > 30
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe TID: 6016Thread sleep time: -5070000s >= -30000s
        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformation
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess information queried: ProcessInformation

        Anti Debugging

        barindex
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeOpen window title or class name: ollydbg
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeFile opened: SIWDEBUG
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeFile opened: NTICE
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeFile opened: SICE
        Source: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtQuerySystemInformation: Direct from: 0x10048B7AC
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtMapViewOfSection: Direct from: 0x1004876E5
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Indirect: 0x1003C5E63
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1004CCEBC
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x10049E28E
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtQuerySystemInformation: Direct from: 0x1004CA095
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1004F3104
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1004B0B9F
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1004F54FA
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x100514C6D
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtQuerySystemInformation: Direct from: 0x1004B0BD6
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtQuerySystemInformation: Direct from: 0x10050477F
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtUnmapViewOfSection: Direct from: 0x1004C79D6
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1007B70C3
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtClose: Direct from: 0x1004C17D6
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtQuerySystemInformation: Direct from: 0x1007B5A24
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x1004E8801
        Source: C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exeNtProtectVirtualMemory: Direct from: 0x100480521
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmp helper 105 0x5A4
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe "C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe" -CreateAutoStart
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im AppleControlPanel.exe
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmpQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{09dc9bae-bd3c-5743-b5d1-99df04016a9f}\MagicMouse.cat VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
        Source: C:\Windows\System32\drvinst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
        Windows Management Instrumentation
        1
        Windows Service
        1
        Windows Service
        22
        Masquerading
        1
        Credential API Hooking
        46
        Security Software Discovery
        Remote Services1
        Credential API Hooking
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        Registry Run Keys / Startup Folder
        11
        Process Injection
        11
        Disable or Modify Tools
        LSASS Memory36
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        36
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        Registry Run Keys / Startup Folder
        11
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
        DLL Side-Loading
        1
        Abuse Elevation Control Mechanism
        LSA Secrets2
        System Owner/User Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials2
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        File Deletion
        DCSync144
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        MagicUtilities-Setup-3.1.4.5-Win10.exe0%VirustotalBrowse
        MagicUtilities-Setup-3.1.4.5-Win10.exe0%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe0%VirustotalBrowse
        C:\Program Files (x86)\MagicUtilities\Service\BluetoothPairing.exe (copy)0%ReversingLabs
        C:\Program Files (x86)\MagicUtilities\Service\BluetoothPairing.exe (copy)0%VirustotalBrowse
        C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exe (copy)0%ReversingLabs
        C:\Program Files (x86)\MagicUtilities\Service\MagicUtilities_Service.exe (copy)0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        184.28.90.27
        unknownUnited States
        16625AKAMAI-ASUSfalse
        IP
        127.0.0.1
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1522465
        Start date and time:2024-09-30 07:11:01 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:27
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Sample name:MagicUtilities-Setup-3.1.4.5-Win10.exe
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@28/17@0/18
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:DA0BEE044D35EC9DACDAB0FA96CB2C00
        SHA1:A9364D2D59322B891191011BE4A17031DD2156A5
        SHA-256:74602190AB3F66D31B81AFC38AE8CB224B4B1E21D22A3BDA90482767C0209C12
        SHA-512:CA54B194672C68ED7ACFD4FC21F02B508B99FE0DB5C6270DC5DA123E145AFABE7C43791623225B76AF00389D99C031FCA6E52E97963523B2898570B2C07DA178
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        • Antivirus: Virustotal, Detection: 0%, Browse
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....q..........."...0...-..N.......:-.. ........@.. ........................1.....a.1...`..................................:-.O....@-..J...........l1..)....1......9-.8............................................ ............... ..H............text.....-.. ....-................. ..`.rsrc....J...@-..L....-.............@..@.reloc........1......j1.............@..B.................:-.....H.......p.,.x{...........5....,..........................................(P...*..(....*:.(......}....*...0..&........(.........r...p.o....(....(.........*....................(....*.(.....o...+~....%-.&.......s....%.....(...+&*n.o....s#...(....r...p($...*..{....*"..}....*^r...p.(....(.....(....*..{....*..{....*..0..X........(.....rm..p(....o....-.r...p.r...p(....s....z..}......(....r...pr...po......(....}....*.0..S........(.....r...p.(....(...+.(...+~....%-.&~..........s....%.
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:607CED1B8039E03E85B8C0476E9F8988
        SHA1:1733CFC6D8E3EA9E2590920C6EBA366649B6B9E0
        SHA-256:8635C575357D5BB67560654748CD4183B79D38A0A060A5AC3644A8C40EEF45D6
        SHA-512:60EDDCF7A0F23380EDD652904B75941E45470766590005E3C66458F004F05184439C8585837D2066842A250D512500A54BE6941F5205D2ECE48E0F0E979F1EC3
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        • Antivirus: Virustotal, Detection: 0%, Browse
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................./.....`...dh...^....J......................................P......RZ[.......................................................J..........=..0X.......Z..)...................................bG.(.....................<..............................text...`........................... ..`.data...dh..........................@....rdata..L1...p......................@..@.pdata..8...........................@..@.bss.....^...@...........................CRT................................@....idata..............................@....cSc0....=..........................@..@.cSc1.....)......................... ..`.cSc2.........<.....................@....cSc3....9V...<..:V.................`..h.rsrc....=.......P...FV.............@..@................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):3249536
        Entropy (8bit):6.647903409585529
        Encrypted:false
        SSDEEP:
        MD5:DA0BEE044D35EC9DACDAB0FA96CB2C00
        SHA1:A9364D2D59322B891191011BE4A17031DD2156A5
        SHA-256:74602190AB3F66D31B81AFC38AE8CB224B4B1E21D22A3BDA90482767C0209C12
        SHA-512:CA54B194672C68ED7ACFD4FC21F02B508B99FE0DB5C6270DC5DA123E145AFABE7C43791623225B76AF00389D99C031FCA6E52E97963523B2898570B2C07DA178
        Malicious:true
        Yara Hits:
        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmp, Author: Joe Security
        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmp, Author: Joe Security
        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Program Files (x86)\MagicUtilities\Service\is-5TT39.tmp, Author: Joe Security
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....q..........."...0...-..N.......:-.. ........@.. ........................1.....a.1...`..................................:-.O....@-..J...........l1..)....1......9-.8............................................ ............... ..H............text.....-.. ....-................. ..`.rsrc....J...@-..L....-.............@..@.reloc........1......j1.............@..B.................:-.....H.......p.,.x{...........5....,..........................................(P...*..(....*:.(......}....*...0..&........(.........r...p.o....(....(.........*....................(....*.(.....o...+~....%-.&.......s....%.....(...+&*n.o....s#...(....r...p($...*..{....*"..}....*^r...p.(....(.....(....*..{....*..{....*..0..X........(.....rm..p(....o....-.r...p.r...p(....s....z..}......(....r...pr...po......(....}....*.0..S........(.....r...p.(....(...+.(...+~....%-.&~..........s....%.
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):5947264
        Entropy (8bit):7.787272168854475
        Encrypted:false
        SSDEEP:
        MD5:607CED1B8039E03E85B8C0476E9F8988
        SHA1:1733CFC6D8E3EA9E2590920C6EBA366649B6B9E0
        SHA-256:8635C575357D5BB67560654748CD4183B79D38A0A060A5AC3644A8C40EEF45D6
        SHA-512:60EDDCF7A0F23380EDD652904B75941E45470766590005E3C66458F004F05184439C8585837D2066842A250D512500A54BE6941F5205D2ECE48E0F0E979F1EC3
        Malicious:false
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................./.....`...dh...^....J......................................P......RZ[.......................................................J..........=..0X.......Z..)...................................bG.(.....................<..............................text...`........................... ..`.data...dh..........................@....rdata..L1...p......................@..@.pdata..8...........................@..@.bss.....^...@...........................CRT................................@....idata..............................@....cSc0....=..........................@..@.cSc1.....)......................... ..`.cSc2.........<.....................@....cSc3....9V...<..:V.................`..h.rsrc....=.......P...FV.............@..@................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:InnoSetup Log Magic Utilities {C457C829-197E-41EF-AEF2-FF998099E695}, version 0x418, 73928 bytes, 035347\37\user\376\, C:\Program Files (x86)\MagicUtilities\376\
        Category:dropped
        Size (bytes):73928
        Entropy (8bit):3.940579855232632
        Encrypted:false
        SSDEEP:
        MD5:79B079FDF2831AD1C057988956F894DF
        SHA1:13266C3954537EF4AC160A7532EF839EEC9E21BA
        SHA-256:0319A9A0E9E6AF2F5B5D49B2D4CFE016ECDAE6E52F23E7AA35F880FA17C29BD2
        SHA-512:0753978E842047C4AB8C5B8D7844B4232AA9344BDFACF12F61B43C99AC831FD2826C7A83264AE07DEEF11C4833ED8C0368FDFD2BB707EED7FE3BF67474106F6E
        Malicious:false
        Reputation:unknown
        Preview:Inno Setup Uninstall Log (b)....................................{C457C829-197E-41EF-AEF2-FF998099E695}..........................................................................................Magic Utilities.......................................................................................................................... ..................................................................................................................h..............>...............0.3.5.3.4.7......c.a.l.i......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.a.g.i.c.U.t.i.l.i.t.i.e.s..................:.... ..........,...IFPS....B........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM..........................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
        Category:dropped
        Size (bytes):24593
        Entropy (8bit):3.280577818982728
        Encrypted:false
        SSDEEP:
        MD5:199FCE2C81BC15A809DF15123EE24938
        SHA1:49EFB06F33B96DCA374E2E9E89B8262B9E1A6277
        SHA-256:6933ACCE29DAD8FB1B9AFE19CF1C220229DD2EE38951129A7993057D88FD9C7B
        SHA-512:9DD7843A01642C37D650BDDBDB697992741C265E554D92C6CA3BEF70C01B8C64049854E388ABD5F1538ED76B61A14FA5FBBE2162EE2895245FD5061F5310A8EB
        Malicious:false
        Reputation:unknown
        Preview:Inno Setup Messages (6.0.0) (u)......................................_..;......;C.a.n.c.e.l. .i.n.s.t.a.l.l.a.t.i.o.n...S.e.l.e.c.t. .a.c.t.i.o.n...&.I.g.n.o.r.e. .t.h.e. .e.r.r.o.r. .a.n.d. .c.o.n.t.i.n.u.e...&.T.r.y. .a.g.a.i.n...&.A.b.o.u.t. .S.e.t.u.p.........%.1. .v.e.r.s.i.o.n. .%.2.....%.3.........%.1. .h.o.m.e. .p.a.g.e.:.....%.4.....A.b.o.u.t. .S.e.t.u.p...Y.o.u. .m.u.s.t. .b.e. .l.o.g.g.e.d. .i.n. .a.s. .a.n. .a.d.m.i.n.i.s.t.r.a.t.o.r. .w.h.e.n. .i.n.s.t.a.l.l.i.n.g. .t.h.i.s. .p.r.o.g.r.a.m.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.c.o.m.m.e.n.d.e.d. .t.h.a.t. .y.o.u. .a.l.l.o.w. .S.e.t.u.p. .t.o. .a.u.t.o.m.a.t.i.c.a.l.l.y. .c.l.o.s.e. .t.h.e.s.e. .a.p.p.l.i.c.a.t.i.o.n.s.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):52
        Entropy (8bit):4.41910913192781
        Encrypted:false
        SSDEEP:
        MD5:832C26D8BF7CBE83CD871026FBE2207B
        SHA1:D8678EE914ED1774F09314E3FF6F49840CB9A4C5
        SHA-256:EA9D56DB7DB78C1E72928561A8037B56255C8A5CB5DDE6AF2300654CD10C9922
        SHA-512:FECBC17C01B0BEC5A4B1EA8AAAD935912FBF5E8774D3EB2BDCD1DFBA37F1A27B7C3303819C915EBCC21FA598ABA9B5DB97CFC60F80E31F266BF6A33875B3B378
        Malicious:false
        Reputation:unknown
        Preview:[MagicUtilitiesService]..InstallAllDriversOnBoot=0..
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 30 04:11:59 2024, mtime=Mon Sep 30 04:11:59 2024, atime=Mon Mar 18 17:23:40 2024, length=16858496, window=hide
        Category:dropped
        Size (bytes):1189
        Entropy (8bit):4.621116197792826
        Encrypted:false
        SSDEEP:
        MD5:C4A99DDF2673481D4A0B4CB33122E737
        SHA1:C6E8A3DD5FA78238399AC6550C21812ED1E14F42
        SHA-256:386796133C79BA45B684412F9B1A640B52F104FFEAC86A60BEB86F69E4D0C7F7
        SHA-512:9303BC5279898F9B6234E1413E8841087958433D68151965D285707A7BDDD30B7B9007A9E067FAA1BEBAB5BAB12B9AF070742917BBAAE081E38690B858CDE1E4
        Malicious:false
        Reputation:unknown
        Preview:L..................F.... ......F.......G.......fay...=...........................P.O. .:i.....+00.../C:\.....................1.....>Yp)..PROGRA~2.........O.I>Yp)....................V.....vp..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1.....>Y.)..MAGICU~1..N......>Y.)>Y.).........................(...M.a.g.i.c.U.t.i.l.i.t.i.e.s.....|.2..=..rX.. .MAGICM~1.EXE..`......>Y.)>Y.)..............................M.a.g.i.c.M.o.u.s.e.U.t.i.l.i.t.i.e.s...e.x.e.......l...............-.......k...........g.@r.....C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe..I.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.a.g.i.c.U.t.i.l.i.t.i.e.s.\.M.a.g.i.c.M.o.u.s.e.U.t.i.l.i.t.i.e.s...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.a.g.i.c.U.t.i.l.i.t.i.e.s.........*................@Z|...K.J.........`.......X.......035347...........hT..CrF.f4... .A.............%..hT..CrF.f4... .A.............%.............1SPS.XF.L8C.
        Process:C:\Users\user\Desktop\MagicUtilities-Setup-3.1.4.5-Win10.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):3403648
        Entropy (8bit):6.300389626502679
        Encrypted:false
        SSDEEP:
        MD5:9D13CC54CB881EF523EEA84C934A8AD1
        SHA1:CC0128344E12D699BB2BE8FCB946ACE81CD8BA8E
        SHA-256:AC45E7D2311D3138311F1B654E76B4685111079915DC55C1E487DF66E1900C36
        SHA-512:1D8A1F5287A53374E1A7EC9DEAD64EB12F2686214AFD63030F6BB5CAACE612D34FDADCDF0A5B771252C94F4437FC79D77B46E15D609591E511CC7C070E66C97A
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        • Antivirus: Virustotal, Detection: 0%, Browse
        Reputation:unknown
        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,..v......hf,......p,...@...........................4.....h74...@......@....................-.......-..9....................3..)...........................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc.................-.............@..@..............1.......0.............@..@........................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32+ executable (console) x86-64, for MS Windows
        Category:dropped
        Size (bytes):1404824
        Entropy (8bit):6.096323082226629
        Encrypted:false
        SSDEEP:
        MD5:485E377D92A45B8BDE1C9930355D0722
        SHA1:7C785CF12A7C34F5358A9FE58EA266FD488A8EB5
        SHA-256:0F93E6FF9A039FD9B352E3DFEEF9B60898B8CC4C8E61747D83E1B41C7E8DE024
        SHA-512:69CB3AEF95D09B5AB32F8DFC0E34415665710DB92A2645AD884CC93F233FDE9C3372F56E5B777E3DF73484069F6100EBD76A113F7D182AF136A864424D0646D8
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        • Antivirus: Virustotal, Detection: 0%, Browse
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........F......../..........J......0.........................................&.............................................................. .......@..P .......l...F...)..................................p ..(....................%...............................text............................... ..`.data....J... ...L..................@....rdata...=...p...>...^..............@..@.pdata...l.......l..................@..@.bss......... ...........................CRT................................@....idata....... ......................@....rsrc...P ...@..."..."..............@.../4...........p&......D..............@..B........................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:Rich Text Format data, version 1, ANSI, code page 1252
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:B544CDC71427D9C12F909CA3241E65AF
        SHA1:6E9F9983F1CDB2B5991811D09DB269934297ACD2
        SHA-256:4401E6F150F54BD652D81BF8E665F627FCC4CBED57C8E6882C29C7F1FA6E15C2
        SHA-512:AB9F1296CC6EB8D6D318AA3C89C285083AB5E6DF374A918A8679A1ECBAFB04844E316333D2ABA48C56B66FB5F25E0630CC035C1384A8F16923D34CD7E06BCDD3
        Malicious:false
        Reputation:unknown
        Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fnil\fcharset0 Segoe UI;}}..{\colortbl ;\red0\green77\blue187;}..{\*\generator Riched20 10.0.17134}\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\b\f0\fs20\lang9 A computer restart is pending.\par..\b0\fs18 Most likely due to a recent Windows update\line (which could still be downloading or installing).\par..\cf1 Installing or updating the Magic Utilities might fail. \line\b\fs20 It's best to restart your computer first\b0 .\fs18\par..\cf0\fs20 If your \b current work is critical\b0 do not continue \line and press the \b Cancel\b0 button below.\line\fs2\par..}...
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:Rich Text Format data, version 1, ANSI, code page 1252
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:5C0B2136816D559D89AE3CB373D0EED8
        SHA1:8D58101198D7A8332ED6D7AF13722366572568B0
        SHA-256:0C070B2D142903AC0E53060043C99ED3AE8304AB33C5AA33DD6E5643E8A0A313
        SHA-512:1D535D734BD1FF4D273B3EF61A03E644B76F508F954559C9F58A124C40F6863F75D4BF1669FC350A8F5ADFBDCA6360A37D4A5BA10E79B02D29DB86148AF06865
        Malicious:false
        Reputation:unknown
        Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fnil\fcharset0 Segoe UI;}}..{\colortbl ;\red0\green77\blue187;}..{\*\generator Riched20 10.0.18362}\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\f0\fs20\lang9 You are about to \b update\b0 the Magic Utilities. \fs18\par..Updates usually install fine. In some cases a computer\line\b restart\b0 is required, follow the instructions.\par..\cf1\fs20 If your \b current work is critical\b0 do not continue \line and press the \b Cancel\b0 button below.\line\fs2 \par..}...
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:PE32+ executable (console) x86-64, for MS Windows
        Category:dropped
        Size (bytes):6144
        Entropy (8bit):4.720366600008286
        Encrypted:false
        SSDEEP:
        MD5:E4211D6D009757C078A9FAC7FF4F03D4
        SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
        SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
        SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        • Antivirus: Virustotal, Detection: 0%, Browse
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:Rich Text Format data, version 1, ANSI, code page 1252
        Category:dropped
        Size (bytes):621
        Entropy (8bit):4.880715430326216
        Encrypted:false
        SSDEEP:
        MD5:B544CDC71427D9C12F909CA3241E65AF
        SHA1:6E9F9983F1CDB2B5991811D09DB269934297ACD2
        SHA-256:4401E6F150F54BD652D81BF8E665F627FCC4CBED57C8E6882C29C7F1FA6E15C2
        SHA-512:AB9F1296CC6EB8D6D318AA3C89C285083AB5E6DF374A918A8679A1ECBAFB04844E316333D2ABA48C56B66FB5F25E0630CC035C1384A8F16923D34CD7E06BCDD3
        Malicious:false
        Reputation:unknown
        Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fnil\fcharset0 Segoe UI;}}..{\colortbl ;\red0\green77\blue187;}..{\*\generator Riched20 10.0.17134}\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\b\f0\fs20\lang9 A computer restart is pending.\par..\b0\fs18 Most likely due to a recent Windows update\line (which could still be downloading or installing).\par..\cf1 Installing or updating the Magic Utilities might fail. \line\b\fs20 It's best to restart your computer first\b0 .\fs18\par..\cf0\fs20 If your \b current work is critical\b0 do not continue \line and press the \b Cancel\b0 button below.\line\fs2\par..}...
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:Rich Text Format data, version 1, ANSI, code page 1252
        Category:dropped
        Size (bytes):524
        Entropy (8bit):4.86457165645488
        Encrypted:false
        SSDEEP:
        MD5:5C0B2136816D559D89AE3CB373D0EED8
        SHA1:8D58101198D7A8332ED6D7AF13722366572568B0
        SHA-256:0C070B2D142903AC0E53060043C99ED3AE8304AB33C5AA33DD6E5643E8A0A313
        SHA-512:1D535D734BD1FF4D273B3EF61A03E644B76F508F954559C9F58A124C40F6863F75D4BF1669FC350A8F5ADFBDCA6360A37D4A5BA10E79B02D29DB86148AF06865
        Malicious:false
        Reputation:unknown
        Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fnil\fcharset0 Segoe UI;}}..{\colortbl ;\red0\green77\blue187;}..{\*\generator Riched20 10.0.18362}\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\f0\fs20\lang9 You are about to \b update\b0 the Magic Utilities. \fs18\par..Updates usually install fine. In some cases a computer\line\b restart\b0 is required, follow the instructions.\par..\cf1\fs20 If your \b current work is critical\b0 do not continue \line and press the \b Cancel\b0 button below.\line\fs2 \par..}...
        Process:C:\Users\user\AppData\Local\Temp\is-FVTT9.tmp\MagicUtilities-Setup-3.1.4.5-Win10.tmp
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 30 04:11:59 2024, mtime=Mon Sep 30 04:12:00 2024, atime=Mon Mar 18 17:23:40 2024, length=16858496, window=hide
        Category:dropped
        Size (bytes):1177
        Entropy (8bit):4.640819794728573
        Encrypted:false
        SSDEEP:
        MD5:10A9C65A3B966DAEF08C41E02B004DA3
        SHA1:56ED17ED05BAB5B6CA1029306647FF0980AEE29F
        SHA-256:4D7D7313AC41EF52ED6D521158A7BF09FD414CCA26452373A0DCD342F1CA3C42
        SHA-512:7A32508EC7E2AEA9552C8C75E206CD84AC856E567091024666BB3879CFEBD5DDE84A8B4C82F69CDEF770B1CB4557F9F411F170F827A3D56F1FCBB4F889A9F209
        Malicious:false
        Reputation:unknown
        Preview:L..................F.... ......F.......G.......fay...=...........................P.O. .:i.....+00.../C:\.....................1.....>Y.)..PROGRA~2.........O.I>Y.)....................V......=..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....f.1.....>Y.)..MAGICU~1..N......>Y.)>Y.).........................%...M.a.g.i.c.U.t.i.l.i.t.i.e.s.....|.2..=..rX.. .MAGICM~1.EXE..`......>Y.)>Y.)..............................M.a.g.i.c.M.o.u.s.e.U.t.i.l.i.t.i.e.s...e.x.e.......l...............-.......k...........g.@r.....C:\Program Files (x86)\MagicUtilities\MagicMouseUtilities.exe..C.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.a.g.i.c.U.t.i.l.i.t.i.e.s.\.M.a.g.i.c.M.o.u.s.e.U.t.i.l.i.t.i.e.s...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.a.g.i.c.U.t.i.l.i.t.i.e.s.........*................@Z|...K.J.........`.......X.......035347...........hT..CrF.f4... .A.............%..hT..CrF.f4... .A.............%.............1SPS.XF.L8C....&.m.q....
        Process:C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe
        File Type:Generic INItialization configuration [BeginLog]
        Category:dropped
        Size (bytes):2495606
        Entropy (8bit):5.223598930678833
        Encrypted:false
        SSDEEP:
        MD5:05F6C2A390F318B826B97BBCB9D7C785
        SHA1:3F9D510F102B1375B59BE10E4331507C13EEF366
        SHA-256:6AE8AF37C61EE4057E2F00D917D0C059E152337BAFFC55971E3D13CCFFF339A8
        SHA-512:08F2D8E1AA3E2BB9A05326534BCE02D9D4E09AB077FC04315F92B257441AF8900EFC520F1585224C52965EC0AF66A22586D5193C37253775E78C1EC0A13AD21E
        Malicious:false
        Reputation:unknown
        Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
        Process:C:\Program Files\Windows Defender\MpCmdRun.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:modified
        Size (bytes):4926
        Entropy (8bit):3.2436157012975593
        Encrypted:false
        SSDEEP:
        MD5:6C73370A3EADBA7F6FE5A9DCEEF94EC5
        SHA1:491DB9EACDA66A46FBA1542163A6D345DD3C865E
        SHA-256:0E6B92D52C6897E22AEDD7F0F5FC7FAC161568F2E6CFD1E3B9E5500DA52AAD87
        SHA-512:06B2AB928D1EB1C2665E8F799355C8306586EDF54231F8250E2A305F81CEE17A4F9C4697CB6198509BF0DD3EFD8203879EF531B99E1693AB8BD8379A02E3A043
        Malicious:false
        Reputation:unknown
        Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. O.c.t. .. 0.6. .. 2.0.2.3. .1.1.:.3.5.:.2.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
        Process:C:\Windows\System32\drvinst.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):74042
        Entropy (8bit):5.390359521990259
        Encrypted:false
        SSDEEP:
        MD5:D926D13331BC3F433AF1EEC3C9C120BD
        SHA1:1AB0912C3DC0F19C20F008A622601F713F1A77B8
        SHA-256:F58444B41763D10E5B4C1230755234051C9E7C1C819D2BF7B54BFAB19906322C
        SHA-512:223E193E15F90C703C61979A2CC7D30752F455D2567D911D682177F9A50C43B049EED12A2F38B0ECBE7C799503334025CA602439893AF03F80004F32CA1D733F
        Malicious:false
        Reputation:unknown
        Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
        Process:C:\Users\user\AppData\Local\Temp\is-NQ6PL.tmp\DriverUnInstaller.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):129
        Entropy (8bit):4.681020691708262
        Encrypted:false
        SSDEEP:
        MD5:45259BAAE12241F60BBF199D7E06C44B
        SHA1:6FC161723301DD4AB22C97D79850A5462D7759A8
        SHA-256:8B9F83D1CEFBF4CD1A4304C2A578F17CD66A3AD536B8E778B1A2A98957C99A43
        SHA-512:3A75B12D927CEB60F07070AB3DEC37365DD0ECD27EA25F188EB219E0138FE63006013D9E075BE2C4CE4440D6B4A5AD2757C931E575F8F667B8FDFA95215341F4
        Malicious:false
        Reputation:unknown
        Preview:..Magic Utilities - Driver (Un)Installer - Version 3.1.3.8....Success installing driver: MagicMouse.inf....Exit code is 0x0 / 0..
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.964732842884367
        TrID:
        • Win32 Executable (generic) a (10002005/4) 98.45%
        • Inno Setup installer (109748/4) 1.08%
        • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
        • Win16/32 Executable Delphi generic (2074/23) 0.02%
        • Generic Win/DOS Executable (2004/3) 0.02%
        File name:MagicUtilities-Setup-3.1.4.5-Win10.exe
        File size:69'423'208 bytes
        MD5:b0a4144c3aeef5d61201706e2f786ff0
        SHA1:224e8360830c2b02e4daef69a2c0d55a98ff0ec4
        SHA256:4150d4963e9283e26e1bbe67f56c733feec94ae4cc42b2e5fc35b40efa92ea8f
        SHA512:aaa65d924e5ca74ec003e059c4bb4a5c6dc568271b95e993712f372c861ee0afa50a29bfcdb8d4233bfff08e68d127ad91f06d35737e1f218a6739265b45208d
        SSDEEP:1572864:fL25J4bR71bbsBcvuGXSSAcH2I2UOoJceLUYU1+SIJ:fkWd5HocGonjJVUYUs
        TLSH:F6E733A2BB34CC99E41B89F09937E93045B7BE74B899840E66E4372EC7B3351295F407
        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
        Icon Hash:334d928faf966d17
        Entrypoint:0x4b5eec
        Entrypoint Section:.itext
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x63ECF218 [Wed Feb 15 14:54:16 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:1
        File Version Major:6
        File Version Minor:1
        Subsystem Version Major:6
        Subsystem Version Minor:1
        Import Hash:e569e6f445d32ba23766ad67d1e3787f
        Signature Valid:true
        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 14/06/2023 02:00:00 22/04/2026 01:59:59
        Subject Chain
        • CN=Magic Utilities Pty Ltd, O=Magic Utilities Pty Ltd, L=Pottsville, S=New South Wales, C=AU, SERIALNUMBER=617 728 319, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=AU
        Version:3
        Thumbprint MD5:E138D0A5D91CBAAF9D219ADAFDB54C7E
        Thumbprint SHA-1:A49FAF128DC394641240A2E50300802EC88FBE1F
        Thumbprint SHA-256:8E20BF4138847097F48F0E110C6757B753D37E84E537FF25FBBB49DFBE767D0A
        Serial:07F9B5BD82CA576EEFBB9D2C9D65DCAD
        Instruction
        push ebp
        mov ebp, esp
        add esp, FFFFFFA4h
        push ebx
        push esi
        push edi
        xor eax, eax
        mov dword ptr [ebp-3Ch], eax
        mov dword ptr [ebp-40h], eax
        mov dword ptr [ebp-5Ch], eax
        mov dword ptr [ebp-30h], eax
        mov dword ptr [ebp-38h], eax
        mov dword ptr [ebp-34h], eax
        mov dword ptr [ebp-2Ch], eax
        mov dword ptr [ebp-28h], eax
        mov dword ptr [ebp-14h], eax
        mov eax, 004B14B8h
        call 00007F146126B805h
        xor eax, eax
        push ebp
        push 004B65E2h
        push dword ptr fs:[eax]
        mov dword ptr fs:[eax], esp
        xor edx, edx
        push ebp
        push 004B659Eh
        push dword ptr fs:[edx]
        mov dword ptr fs:[edx], esp
        mov eax, dword ptr [004BE634h]
        call 00007F146130E2F7h
        call 00007F146130DE4Ah
        lea edx, dword ptr [ebp-14h]
        xor eax, eax
        call 00007F14612812A4h
        mov edx, dword ptr [ebp-14h]
        mov eax, 004C1D84h
        call 00007F14612663F7h
        push 00000002h
        push 00000000h
        push 00000001h
        mov ecx, dword ptr [004C1D84h]
        mov dl, 01h
        mov eax, dword ptr [004238ECh]
        call 00007F1461282427h
        mov dword ptr [004C1D88h], eax
        xor edx, edx
        push ebp
        push 004B654Ah
        push dword ptr fs:[edx]
        mov dword ptr fs:[edx], esp
        call 00007F146130E37Fh
        mov dword ptr [004C1D90h], eax
        mov eax, dword ptr [004C1D90h]
        cmp dword ptr [eax+0Ch], 01h
        jne 00007F146131459Ah
        mov eax, dword ptr [004C1D90h]
        mov edx, 00000028h
        call 00007F1461282D1Ch
        mov edx, dword ptr [004C1D90h]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
        IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x47a10.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x42326e80x2980
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0xc70000x47a100x47c005e29bdd19ebeb493bcb935cc58b4e613False0.22892394381533102data3.9448202111738997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xc77380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.5726950354609929
        RT_ICON0xc7ba00x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0EnglishUnited States0.5569767441860465
        RT_ICON0xc82580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.46024590163934426
        RT_ICON0xc8be00xcd8Device independent bitmap graphic, 28 x 56 x 32, image size 0EnglishUnited States0.40541362530413627
        RT_ICON0xc98b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.39704502814258913
        RT_ICON0xca9600x1588Device independent bitmap graphic, 36 x 72 x 32, image size 0EnglishUnited States0.32093613933236576
        RT_ICON0xcbee80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States0.3239644970414201
        RT_ICON0xcd9500x1fc8Device independent bitmap graphic, 44 x 88 x 32, image size 0EnglishUnited States0.29818092428711895
        RT_ICON0xcf9180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.28620331950207467
        RT_ICON0xd1ec00x32e8Device independent bitmap graphic, 56 x 112 x 32, image size 0EnglishUnited States0.2422498465316145
        RT_ICON0xd51a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.21711147850732168
        RT_ICON0xd93d00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 0EnglishUnited States0.15337338262476893
        RT_ICON0xde8580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 0EnglishUnited States0.1349248120300752
        RT_ICON0xe50400x7d48Device independent bitmap graphic, 88 x 176 x 32, image size 0EnglishUnited States0.15555624844100774
        RT_ICON0xecd880x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States0.11209796089972672
        RT_ICON0xf62300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.10894061280018928
        RT_ICON0x106a580x4f2fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9931922450791771
        RT_STRING0x10b9880x360data0.34375
        RT_STRING0x10bce80x260data0.3256578947368421
        RT_STRING0x10bf480x45cdata0.4068100358422939
        RT_STRING0x10c3a40x40cdata0.3754826254826255
        RT_STRING0x10c7b00x2d4data0.39226519337016574
        RT_STRING0x10ca840xb8data0.6467391304347826
        RT_STRING0x10cb3c0x9cdata0.6410256410256411
        RT_STRING0x10cbd80x374data0.4230769230769231
        RT_STRING0x10cf4c0x398data0.3358695652173913
        RT_STRING0x10d2e40x368data0.3795871559633027
        RT_STRING0x10d64c0x2a4data0.4275147928994083
        RT_RCDATA0x10d8f00x10data1.5
        RT_RCDATA0x10d9000x2c4data0.6384180790960452
        RT_RCDATA0x10dbc40x2cdata1.2045454545454546
        RT_GROUP_ICON0x10dbf00xf4dataEnglishUnited States0.6721311475409836
        RT_VERSION0x10dce40x584dataEnglishUnited States0.2811614730878187
        RT_MANIFEST0x10e2680x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
        DLLImport
        kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
        comctl32.dllInitCommonControls
        version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
        user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
        oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
        netapi32.dllNetWkstaGetInfo, NetApiBufferFree
        advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
        NameOrdinalAddress
        TMethodImplementationIntercept30x4541a8
        __dbk_fcall_wrapper20x40d0a0
        dbkFCallWrapperAddr10x4be63c
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States