Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..

Overview

General Information

Sample URL:https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAu
Analysis ID:1528374
Infos:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file does not import any functions
PE file overlay found
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 2348 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6796 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6604 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6328 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA.." MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • rundll32.exe (PID: 7952 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • Qobuz_Installer.exe (PID: 7176 cmdline: "C:\Users\user\Downloads\Qobuz_Installer.exe" MD5: E3C287CB89AB1C6DCD675468A70EF62E)
    • Update.exe (PID: 7228 cmdline: "C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install . MD5: 322669DD7E99D0C179E205CFA903E102)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\SquirrelTemp\Update.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    C:\Users\user\AppData\Local\Qobuz\Update.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeFile created: C:\Users\user\AppData\Local\SquirrelTemp\Squirrel-Install.logJump to behavior
      Source: Binary string: netstandard.pdb.mdb source: Update.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.dr
      Source: Binary string: C:\Users\ani\code\squirrel\squirrel.windows\build\Release\Win32\Setup.pdb source: Qobuz_Installer.exe, 00000010.00000000.2104901404.0000000000BFF000.00000002.00000001.01000000.00000006.sdmp, Unconfirmed 118702.crdownload.0.dr

      Networking

      barindex
      Source: Yara matchFile source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Qobuz\Update.exe, type: DROPPED
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2357008515.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: Update.exe.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://ocsp.digicert.com0
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2357008515.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://ocsp.digicert.com0X
      Source: Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsoft
      Source: Qobuz_Installer.exe, 00000010.00000003.2356612221.0000000008827000.00000004.00000020.00020000.00000000.sdmp, Qobuz_Installer.exe, 00000010.00000003.2356612221.000000000881A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: http://www.digicert.com/CPS0
      Source: Update.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: https://api.github.com/#
      Source: Update.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drString found in binary or memory: https://github.com/myuser/myrepo
      Source: Unconfirmed 118702.crdownload.0.drStatic PE information: Resource name: DATA type: Zip archive data, at least v2.0 to extract, compression method=deflate
      Source: 4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmp.0.drStatic PE information: No import functions for PE file found
      Source: 4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmp.0.drStatic PE information: Data appended to the last section found
      Source: classification engineClassification label: sus25.troj.win@29/17@0/11
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmpJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeMutant created: NULL
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeFile created: C:\Users\user\AppData\Local\Temp\.squirrel-lock-0FEF7D82B19CDAC5BEB5C9BE96BA9FAABA7A8D70Jump to behavior
      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA.."
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: unknownProcess created: C:\Users\user\Downloads\Qobuz_Installer.exe "C:\Users\user\Downloads\Qobuz_Installer.exe"
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeProcess created: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe "C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install .
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeProcess created: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe "C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install . Jump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: logoncli.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: msvcp140_clr0400.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeSection loaded: profapi.dllJump to behavior
      Source: Google Drive.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: YouTube.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Sheets.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Gmail.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Slides.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Docs.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Binary string: netstandard.pdb.mdb source: Update.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.dr
      Source: Binary string: C:\Users\ani\code\squirrel\squirrel.windows\build\Release\Win32\Setup.pdb source: Qobuz_Installer.exe, 00000010.00000000.2104901404.0000000000BFF000.00000002.00000001.01000000.00000006.sdmp, Unconfirmed 118702.crdownload.0.dr
      Source: 4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmp.0.drStatic PE information: real checksum: 0x7930f55 should be: 0x5ab6
      Source: C:\Users\user\Downloads\Qobuz_Installer.exeFile created: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeJump to dropped file
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 118702.crdownloadJump to dropped file
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Qobuz_Installer.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeFile created: C:\Users\user\AppData\Local\Qobuz\Update.exeJump to dropped file
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeFile created: C:\Users\user\AppData\Local\SquirrelTemp\Squirrel-Install.logJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeMemory allocated: 1350000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeMemory allocated: 1AB50000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeWindow / User API: threadDelayed 577Jump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe TID: 6936Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe TID: 1940Thread sleep count: 577 > 30Jump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeQueries volume information: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping32
      Virtualization/Sandbox Evasion
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      1
      DLL Side-Loading
      1
      Rundll32
      LSASS Memory1
      Application Window Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      1
      Disable or Modify Tools
      Security Account Manager12
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook32
      Virtualization/Sandbox Evasion
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Process Injection
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528374 URL: https://desktop.qobuz.com/r... Startdate: 07/10/2024 Architecture: WINDOWS Score: 25 44 Yara detected Generic Downloader 2->44 6 Qobuz_Installer.exe 6 2->6         started        9 chrome.exe 20 2->9         started        12 rundll32.exe 2->12         started        14 chrome.exe 2->14         started        process3 dnsIp4 26 C:\Users\user\AppData\Local\...\Update.exe, PE32 6->26 dropped 16 Update.exe 8 6->16         started        40 192.168.2.16 unknown unknown 9->40 42 239.255.255.250 unknown Reserved 9->42 28 C:\Users\...\Unconfirmed 118702.crdownload, PE32 9->28 dropped 30 C:\Users\user\...\Qobuz_Installer.exe (copy), PE32 9->30 dropped 32 4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmp, PE32 9->32 dropped 19 chrome.exe 9->19         started        22 chrome.exe 9->22         started        file5 process6 dnsIp7 24 C:\Users\user\AppData\Local\...\Update.exe, PE32 16->24 dropped 34 142.250.181.238 GOOGLEUS United States 19->34 36 142.250.185.68 GOOGLEUS United States 19->36 38 7 other IPs or domains 19->38 file8

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Qobuz\Update.exe0%ReversingLabs
      C:\Users\user\AppData\Local\SquirrelTemp\Update.exe0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/myuser/myrepoUpdate.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drfalse
        unknown
        https://api.github.com/#Update.exe, 00000011.00000000.2357546299.00000000006B2000.00000002.00000001.01000000.00000007.sdmp, Update.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmp, Update.exe.16.drfalse
          unknown
          http://schemas.microsoftUpdate.exe, 00000011.00000002.2421409702.000000001B960000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            142.250.181.238
            unknownUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            142.250.185.68
            unknownUnited States
            15169GOOGLEUSfalse
            34.104.35.123
            unknownUnited States
            15169GOOGLEUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            142.250.186.174
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.18.3
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.16.195
            unknownUnited States
            15169GOOGLEUSfalse
            18.239.83.39
            unknownUnited States
            16509AMAZON-02USfalse
            66.102.1.84
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.16
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1528374
            Start date and time:2024-10-07 21:20:13 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 7s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Sample URL:https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:18
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:SUS
            Classification:sus25.troj.win@29/17@0/11
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Skipping network analysis since amount of network traffic is too extensive
            • VT rate limit hit for: https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1909784
            Entropy (8bit):5.909112632493668
            Encrypted:false
            SSDEEP:24576:EWltPuAnUCiag6CKM2zCy9sQuOjj1VgZej6GeS4lNrCze5qhYp4t9m2z:ht3UCiag6CKM2zCyZuOjJaxSS5qhb
            MD5:322669DD7E99D0C179E205CFA903E102
            SHA1:69C4B44915CCCC69401740CFD01C1B05CACFC3BD
            SHA-256:CBA85A24C989182FE8A993C84BDA795E10CA9036BB77914D91E3F24E9C04B447
            SHA-512:F5CF723409B98E364CE285EFED1293AC35FEC25528462A6573E829A990DDD54D351AD1380A76448889EE5CCFE4FEA8DBCA83A627B2A3350E5DE6E34AD5FE1A95
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Qobuz\Update.exe, Author: Joe Security
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5.p_............................>.... ........@.. .......................`.......R....@.....................................W.... ...................(...@....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................ .......H.......LU..............,.................................................{....*..{....*..{....*r.(......}......}......}....*....0..S........u......,G(.....{.....{....o....,/(.....{.....{....o....,.(.....{.....{....o....*.*..0..K....... .A. )UU.Z(.....{....o....X )UU.Z(.....{....o....X )UU.Z(.....{....o....X*..0...........r...p......%..{.......%q.........-.&.+.......o.....%..{.......%q.........-.&.+.......o.....%..{.......%q.........-.&.+.......o.....(....*....{....*..{....*
            Process:C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
            File Type:Zip archive data, at least v2.0 to extract, compression method=store
            Category:dropped
            Size (bytes):126266575
            Entropy (8bit):7.999387376653128
            Encrypted:true
            SSDEEP:3145728:s4g+WMf+iSunwVYG9gCqMh0OZ7FjxIts22WLbJXLqx:uuwe8rqPsJWtrJWx
            MD5:0ABE86B1F3F4B2ABF82D42869EB11D05
            SHA1:0450B01403D9CD57E2551B06C84ECDC3CDFEFF1E
            SHA-256:F15F3CF08349A0CF9CC649B4D8A65AD5D52C53679D9BAA634A061F4F8F21A1DF
            SHA-512:8D97FAEDCC81630E03C72292B303EEE6474107679C62C0AF5C590AF292EB11AEBB70A1F271E17785B4126D5FEE7FE48657CC24B09DA8C55056383A18D34C7DC5
            Malicious:false
            Reputation:low
            Preview:PK........aR|X................lib/PK........bR|X................lib/net45/PK........aR|X.c..r...`-.. ...lib/net45/chrome_100_percent.pak..uX.Q...<ZB.S.[RB)...)i..v.!..F:....n.....$.............};..3w.7g.9..{f....B.&@...!&....6..P?...{8.......V....;......K...L..M..mr......p....Y.....}q&....7.......K.hv....8...B3H_J..`}.).B..d...o...O(......LV...0[M+..b.....FU..V;..`.....n........VV2..<.rz...........Z.+US..V..t..4C.i5Q...J...7.....0A..0|...wX~.....+....1.]..s.x.5..7W...;....9....cN.@.O!.......+q ..G.C ....@.,C..08....`$.."`*..D..$!....B .f...kxU.......$..Z.x.7=..[8.....N]...z.H.C.!....A .V4.@.Lm..w.....azK...S. ...XC ....@>|d..B....E..g.....!P..{@.....@.....Z8.......|... .....'X2.....4.`.X.|...l... ..[.C...O.@.L....0A"....$....x....>...0_...`.\.t..h...y...!..;.@...S../0u.....b.........!0...B......c....p...&.[..... ...:...Lp..ix...3....f.v4.........\.M. ..s]B`..C..p...~.....a6..V..4W.J....]0.`.f.D.u....l....`.V.A..X........@..B...&.......hR ..".%2......hR#.......MZ...t
            Process:C:\Users\user\Downloads\Qobuz_Installer.exe
            File Type:Zip archive data, at least v2.0 to extract, compression method=store
            Category:dropped
            Size (bytes):126266575
            Entropy (8bit):7.999387376653128
            Encrypted:true
            SSDEEP:3145728:s4g+WMf+iSunwVYG9gCqMh0OZ7FjxIts22WLbJXLqx:uuwe8rqPsJWtrJWx
            MD5:0ABE86B1F3F4B2ABF82D42869EB11D05
            SHA1:0450B01403D9CD57E2551B06C84ECDC3CDFEFF1E
            SHA-256:F15F3CF08349A0CF9CC649B4D8A65AD5D52C53679D9BAA634A061F4F8F21A1DF
            SHA-512:8D97FAEDCC81630E03C72292B303EEE6474107679C62C0AF5C590AF292EB11AEBB70A1F271E17785B4126D5FEE7FE48657CC24B09DA8C55056383A18D34C7DC5
            Malicious:false
            Reputation:low
            Preview:PK........aR|X................lib/PK........bR|X................lib/net45/PK........aR|X.c..r...`-.. ...lib/net45/chrome_100_percent.pak..uX.Q...<ZB.S.[RB)...)i..v.!..F:....n.....$.............};..3w.7g.9..{f....B.&@...!&....6..P?...{8.......V....;......K...L..M..mr......p....Y.....}q&....7.......K.hv....8...B3H_J..`}.).B..d...o...O(......LV...0[M+..b.....FU..V;..`.....n........VV2..<.rz...........Z.+US..V..t..4C.i5Q...J...7.....0A..0|...wX~.....+....1.]..s.x.5..7W...;....9....cN.@.O!.......+q ..G.C ....@.,C..08....`$.."`*..D..$!....B .f...kxU.......$..Z.x.7=..[8.....N]...z.H.C.!....A .V4.@.Lm..w.....azK...S. ...XC ....@>|d..B....E..g.....!P..{@.....@.....Z8.......|... .....'X2.....4.`.X.|...l... ..[.C...O.@.L....0A"....$....x....>...0_...`.\.t..h...y...!..;.@...S../0u.....b.........!0...B......c....p...&.[..... ...:...Lp..ix...3....f.v4.........\.M. ..s]B`..C..p...~.....a6..V..4W.J....]0.`.f.D.u....l....`.V.A..X........@..B...&.......hR ..".%2......hR#.......MZ...t
            Process:C:\Users\user\Downloads\Qobuz_Installer.exe
            File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
            Category:dropped
            Size (bytes):81
            Entropy (8bit):4.723678824852715
            Encrypted:false
            SSDEEP:3:5HorXTXFUn8whC0FLi/YrGGfwn:5HATXunRhBi2G6w
            MD5:9804023C935B4A504DDDCB0130129006
            SHA1:4C8EC8C10DF7A3CAA2AECB512AA50939228C8BA1
            SHA-256:EEC0EFD447C2AB0C55D6DE9E3A9406891B2D953239C03C2651CF90ECB9697F79
            SHA-512:370B282E76E54C1720DF7E5D6C856B0F35AF84F4B8F97B45E29E9719E4B38FE5EEFF10C11390E017D8EA57A7462B94F606D6AD7F8E3A6D7713BCD8F6AE679FF5
            Malicious:false
            Reputation:low
            Preview:.0450B01403D9CD57E2551B06C84ECDC3CDFEFF1E Qobuz-7.1.4-b008-full.nupkg 126266575
            Process:C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
            Category:dropped
            Size (bytes):470
            Entropy (8bit):5.200762201919238
            Encrypted:false
            SSDEEP:6:4SNHAxFSVUB4h1NHAxFSviqqZZeRN232UONHAxFQBNRN230ZNNHAxFEKFr3QkOR8:4+mYV/JmYaTmmHEFmmWr9mmmCvn
            MD5:C3BE6545B87112FD3608F53EF74FDFCD
            SHA1:C4B1F52DBDC720041470FF27F7841C4C06394EBD
            SHA-256:E385837CCE113C6B4714D0A276C827112D5AB6D5862B5CE7717E5806E925C76A
            SHA-512:7193765F837184E3ACC271DE10A9BFB84AB7C5E0BF868C7EB43C0C995189985C7A5B7BA454F3397D6B1F7D7E62A69E4889B98726280471852FF852D1FCFC883B
            Malicious:false
            Reputation:low
            Preview:.[07/10/24 15:22:44] info: Program: Starting Squirrel Updater: --install ...[07/10/24 15:22:44] info: Program: Starting install, writing to C:\Users\user\AppData\Local\SquirrelTemp..[07/10/24 15:22:44] info: Program: About to install to: C:\Users\user\AppData\Local\Qobuz..[07/10/24 15:22:44] info: CheckForUpdateImpl: Reading RELEASES file from C:\Users\user\AppData\Local\SquirrelTemp..[07/10/24 15:22:44] info: CheckForUpdateImpl: First run, starting from scratch..
            Process:C:\Users\user\Downloads\Qobuz_Installer.exe
            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):1909784
            Entropy (8bit):5.909112632493668
            Encrypted:false
            SSDEEP:24576:EWltPuAnUCiag6CKM2zCy9sQuOjj1VgZej6GeS4lNrCze5qhYp4t9m2z:ht3UCiag6CKM2zCyZuOjJaxSS5qhb
            MD5:322669DD7E99D0C179E205CFA903E102
            SHA1:69C4B44915CCCC69401740CFD01C1B05CACFC3BD
            SHA-256:CBA85A24C989182FE8A993C84BDA795E10CA9036BB77914D91E3F24E9C04B447
            SHA-512:F5CF723409B98E364CE285EFED1293AC35FEC25528462A6573E829A990DDD54D351AD1380A76448889EE5CCFE4FEA8DBCA83A627B2A3350E5DE6E34AD5FE1A95
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe, Author: Joe Security
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5.p_............................>.... ........@.. .......................`.......R....@.....................................W.... ...................(...@....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................ .......H.......LU..............,.................................................{....*..{....*..{....*r.(......}......}......}....*....0..S........u......,G(.....{.....{....o....,/(.....{.....{....o....,.(.....{.....{....o....*.*..0..K....... .A. )UU.Z(.....{....o....X )UU.Z(.....{....o....X )UU.Z(.....{....o....X*..0...........r...p......%..{.......%q.........-.&.+.......o.....%..{.......%q.........-.&.+.......o.....%..{.......%q.........-.&.+.......o.....(....*....{....*..{....*
            Process:C:\Users\user\Downloads\Qobuz_Installer.exe
            File Type:GIF image data, version 89a, 400 x 400
            Category:dropped
            Size (bytes):13759
            Entropy (8bit):7.825511786108246
            Encrypted:false
            SSDEEP:384:QBsLojTiOGCr1nQV9312kOhYrIejIwMDnMUttjMCi:QY0QVd12kOhYGkUP4
            MD5:806A5048AF545F6DD028A821195CAD04
            SHA1:DC86F9EA36DF8836AD514179DF9E109D84B3BF40
            SHA-256:8C9BC304920566BFE182153AA2904781427396B19639104D8131638C5F6CDEFA
            SHA-512:DB90D6288A90D5E32582218BCC2208308CA79D96870DE705B768AF53BEDC6A66BB57BBCAED1F0064AF3B8FF22EEA3DDA516455A1D4D4467B6C0B466B8E555A8A
            Malicious:false
            Reputation:low
            Preview:GIF89a.......L..4......VVV...~~~..."..dddvvv___777{..k..999.........NNN...=......C..yyy...SSSjjjAAAv...v....JJJ...-........................e........TTT...R...........ttt]...z.......~.Y..a...s.......................|.......V..............x...'..p...p..........===QQQ...000sss555///...MMM|||bbb........>>>.........222.........111333...:::...LLLBBB...444...ZZZ...........hhh...HHH.........]]].....mmm...DDDoooGGG............<<<...EEE...............................fff...YYY;;;.................CCCIIIFFF........rrr```...PPP.........lllnnnpppaaaXXXggg...qqq...{{{.......................iii...ccc...................\\\???.............................................[[[...zzz...........}}}..............................q.....q........r.................t.---......!..NETSCAPE2.0.....!..XMP DataXMP<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c142 79.160924, 2017/07/13-01:06:39 "> <rdf:RDF xmlns:rdf="ht
            Process:C:\Users\user\Downloads\Qobuz_Installer.exe
            File Type:MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 24x24, 32 bits/pixel
            Category:dropped
            Size (bytes):32886
            Entropy (8bit):6.433718194665238
            Encrypted:false
            SSDEEP:384:zB+iiV1vXBL5t1eObjZAQrafEVtfjkUMXcVmX5i0ejoZ/PGK7Co0X9g7BNlbrzi:z6HtMfSWXcVYejimozPbHi
            MD5:328B22E25FB1724E626A0957AC93FAFA
            SHA1:C70FDE3658E3EFBB5F3399ABFD4A40F780345391
            SHA-256:72858A5D9771432A5FBD5BA30F6A91415E6324C10FC7AB892B1235921F4E1C3E
            SHA-512:FBB2F909582F88CFCFF07CD1FFB03DD411F8AF23100C6DBF1F68406FA7E16066AE86BA3A9F86E7B78EE08EEF0C8A3F37266B6BA2067C2A3E910ED7F888DDB05B
            Malicious:false
            Reputation:low
            Preview:............ .h...V......... ......... .... .....F...00.... ..%............ ..;...D..(....... ..... ............................................%...v777.LLL.JJJ.///....i...........w.......................iccc....................kkk. .......................$$$.............kkk.GGG.DDD.WWW.^^^.;;;.........iii....L.......n........eee........................................yKKK....,hhh.....aaa.........................................TTT.................................777.111.........WWW................^???.....```.........................................}}}.....---.YYY.....:::.........CCC.................+++.........TTT.....CCC.YYY.....999.........EEE.................---.........TTT.....CCC.AAA.....]]].........................................|||.....---.........................;;;.ooo.jjj.444........................`...0lll.....[[[.....000.ccc.........\\\.***.....uuu.....WWW............t........ddd.888.ggg.........___.777.www............V///.........(((.............}}}.xxx.www.......
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.986293109294094
            Encrypted:false
            SSDEEP:48:83d2jTi+WfHJidAKZdA1FehwiZUklqehgy+3:8YXk3y
            MD5:7F1971A795C02EE65E09B7882BB5C40C
            SHA1:0C5C2F94FE5CE529AE287DA228E67C44CEDD1590
            SHA-256:A1B0ED56CF25D98FCFDFD9CF2AA8A441C9E14DFF00136E94AD67D41959A6EC28
            SHA-512:107F08246585BA6E5FE071EE64D1D7CCD896B4AE792CC2E61576FE11D0B60BEF6F00A56894D65D202C4E714D70DBC2399AA20C23597598B5F05502E03B9CF976
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,......v.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):4.000789769262603
            Encrypted:false
            SSDEEP:48:8od2jTi+WfHJidAKZdA1seh/iZUkAQkqehny+2:85Xa9QKy
            MD5:81F0DD245305B17FC0EB18DF38A566C0
            SHA1:258B9EC1F10F21733CF052F806BB4F3B1A7E1C67
            SHA-256:5846AB2C78F6BC9CB59110B87D80BA71A403225E8193AC59551F90381F0D9B1F
            SHA-512:21D69762D1ECBDDB99F6E86C1C4972B44AF5BF57E0D2D9B8EFF017442143433B7D2F29EF20A8B2EB62E10374747D7F837C491CA507A3C82EB9231B61550CE6B6
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.....j.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.00984656300885
            Encrypted:false
            SSDEEP:48:8vd2jTi+AHJidAKZdA14meh7sFiZUkmgqeh7sBy+BX:8gXAnzy
            MD5:AFCD5317E53EF6FA4827B05DF14AEA1F
            SHA1:FC88AD62F8BFC1172D3B43A9027098A24A120525
            SHA-256:D0EA8FC1348608AF36CF555685E728DCE874048C0A1AD2E1EFE3B3394F343D98
            SHA-512:9724D0ADD09F7FE9CD7742C37E47EDDB29906FF69432DBD6C2BA5120BC23D8662B874A2F5BF48281BFD0CEA21117C287A3612AB30E5635DFC72E03273900ABF3
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9987313616736833
            Encrypted:false
            SSDEEP:48:8md2jTi+WfHJidAKZdA1TehDiZUkwqehby+R:8/XRpy
            MD5:C433A0C93044A2B4C1280C27C0BF7EB7
            SHA1:5B247813EEBCA59245EBF2356ED0487D4D2D6FEE
            SHA-256:4818C8F3297ED78EEA1F711E00C070591BC9A5E6FB3E94780558459311249F04
            SHA-512:36C34CF81E0C7CACBFDA5BE48832DC5F2D4C78907491AED43ECF1A46A84B2AF6E33A6935EAD91250D94F3B918348F5D5E7C233E9548D3E4BA85E0902F0E01D2E
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,....N.d.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9882637407251416
            Encrypted:false
            SSDEEP:48:8qd2jTi+WfHJidAKZdA1dehBiZUk1W1qehty+C:8zXR9Ny
            MD5:547D3029B2BFE2F6CFD7BF0250659A48
            SHA1:1973AB7E8613B8E68814356B77C2EE4471F62BF3
            SHA-256:1B672CBFC3538BD948AFC8393946DDEF2D9E509786BED47A2147DAFB9152101D
            SHA-512:DCD2C88C6488802AE64633A30DF8DD0676C083B307A33C167A98361CCE53B7DFFFAA85D42E69ACA1B78E739AB9F5ED6447F1FB8C4418841D14535CB90BE4FF38
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,......q.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.995469546159947
            Encrypted:false
            SSDEEP:48:8+d2jTi+WfHJidAKZdA1duTeehOuTbbiZUk5OjqehOuTbzy+yT+:8HX5TfTbxWOvTbzy7T
            MD5:824556D2C49B5A7695ED97660ED80CEC
            SHA1:4EE14B1ABAECFEF608F310C4EDDB81DCDCFEDE1B
            SHA-256:14BBD62E0BBCA070D468DC318949572DB8C5883D8A5992DF2389CFF82CE5701E
            SHA-512:5646E6DB216074B98C65E9F815064307554335DD446CF2B807D2CFBFE17A85F16E0B477F17479F2945F5FFBE716392FC5AF971CF3A250D1BC1E2BE8EE1AF0598
            Malicious:false
            Reputation:low
            Preview:L..................F.@.. ...$+.,.....*\.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IGY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VGY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VGY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VGY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VGY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............{.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):16384
            Entropy (8bit):6.463390521905789
            Encrypted:false
            SSDEEP:384:xJqlHr+sqPkKYbO5ijGXMpxiVX11j1hodl9TIBAde7cYy/xLXFlEPam/:xJeO24OClN1e390B0ei/FXWaQ
            MD5:05C038D30B66FEB6DA3EF05CC0575781
            SHA1:8000EF1ED3E72AB28A9036AC6A599036E7D2569D
            SHA-256:7E810C5ECC212FE799AD31CEA091275DD02BE27C510C01FDC65AD9AA5E16265B
            SHA-512:2CED136308671A8931C143D157034AB20581B274F6465D95E4B0D1394985AE1850273049983CB6CFD12FCD54A9ECED3B9862F071519C125F8E7EF041AB9C5B51
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X......................y.........................................a...T....T.Z.......2.....T......Rich....................PE..L.....p_............................\.............@................................U.....@.................................,...P.......h...............(.......... w..p...............................@............................................text...+........................... ..`.rdata..............................@..@.data...p...........................@....rsrc...h.........................@..@.reloc...............~..............@..B........................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):127057944
            Entropy (8bit):7.999595397129439
            Encrypted:true
            SSDEEP:3145728:FK09rUNdaYSF3GM0vn0VCY+LjcDdAMmpHy4Z86sOJLTmNn:jNfa6C5chXMHzJ/Un
            MD5:E3C287CB89AB1C6DCD675468A70EF62E
            SHA1:3B2DD39C8A188FD940E92A3F5AA8854E4FEBFDC6
            SHA-256:E230EBF49579575EEAD5AC6CE852B59AC5775680990125BD20E1F4084932A5C8
            SHA-512:307377F4D7F275460D4098DBF9969D6DEF2DD49E82B648DE08569A8FC78DDCB6B7C50DDE8FF463734085658F7CE46FF2627306045EFB6BAC10CC636B8A34C4E7
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X......................y.........................................a...T....T.Z.......2.....T......Rich....................PE..L.....p_............................\.............@................................U.....@.................................,...P.......h...............(.......... w..p...............................@............................................text...+........................... ..`.rdata..............................@..@.data...p...........................@....rsrc...h.........................@..@.reloc...............~..............@..B........................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):127057944
            Entropy (8bit):7.999595397129439
            Encrypted:true
            SSDEEP:3145728:FK09rUNdaYSF3GM0vn0VCY+LjcDdAMmpHy4Z86sOJLTmNn:jNfa6C5chXMHzJ/Un
            MD5:E3C287CB89AB1C6DCD675468A70EF62E
            SHA1:3B2DD39C8A188FD940E92A3F5AA8854E4FEBFDC6
            SHA-256:E230EBF49579575EEAD5AC6CE852B59AC5775680990125BD20E1F4084932A5C8
            SHA-512:307377F4D7F275460D4098DBF9969D6DEF2DD49E82B648DE08569A8FC78DDCB6B7C50DDE8FF463734085658F7CE46FF2627306045EFB6BAC10CC636B8A34C4E7
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X......................y.........................................a...T....T.Z.......2.....T......Rich....................PE..L.....p_............................\.............@................................U.....@.................................,...P.......h...............(.......... w..p...............................@............................................text...+........................... ..`.rdata..............................@..@.data...p...........................@....rsrc...h.........................@..@.reloc...............~..............@..B........................................................................................................................................................................................................................................................................................
            No static file info
            Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:15:20:41
            Start date:07/10/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Imagebase:0x7ff7f9810000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:1
            Start time:15:20:41
            Start date:07/10/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff7f9810000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:2
            Start time:15:20:42
            Start date:07/10/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA.."
            Imagebase:0x7ff7f9810000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:3
            Start time:15:20:44
            Start date:07/10/2024
            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Imagebase:0x7ff7f9810000
            File size:3'242'272 bytes
            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:15
            Start time:15:22:14
            Start date:07/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            Imagebase:0x7ff78c830000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:16
            Start time:15:22:17
            Start date:07/10/2024
            Path:C:\Users\user\Downloads\Qobuz_Installer.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Downloads\Qobuz_Installer.exe"
            Imagebase:0xbe0000
            File size:127'057'944 bytes
            MD5 hash:E3C287CB89AB1C6DCD675468A70EF62E
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Target ID:17
            Start time:15:22:43
            Start date:07/10/2024
            Path:C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install .
            Imagebase:0x6b0000
            File size:1'909'784 bytes
            MD5 hash:322669DD7E99D0C179E205CFA903E102
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\SquirrelTemp\Update.exe, Author: Joe Security
            Antivirus matches:
            • Detection: 0%, ReversingLabs
            Reputation:low
            Has exited:false

            No disassembly