Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Analysis ID:1631970
MD5:ebd53ab0acbd8067e616b8c85c126811
SHA1:108f7779e1c55411e1a40e38c700a16cc53c761b
SHA256:88ef00996d1a65e840f7610e76962bba27081c1832772dff255d88c68e7843ce
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious PE digital signature
Allocates memory in foreign processes
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe (PID: 7512 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" MD5: EBD53AB0ACBD8067E616B8C85C126811)
    • SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp (PID: 7544 cmdline: "C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$20406,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" MD5: 83931244392565631DFD4E62A33C5840)
      • SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe (PID: 7600 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT MD5: EBD53AB0ACBD8067E616B8C85C126811)
        • SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp (PID: 7616 cmdline: "C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$2040E,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT MD5: 83931244392565631DFD4E62A33C5840)
          • AutoIt3.exe (PID: 7672 cmdline: "C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe" hepatoma.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
            • jsc.exe (PID: 7784 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
  • AutoIt3.exe (PID: 7796 cmdline: "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x" MD5: 3F58A517F1F4796225137E7659AD2ADB)
    • jsc.exe (PID: 7912 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
  • AutoIt3.exe (PID: 7880 cmdline: "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x" MD5: 3F58A517F1F4796225137E7659AD2ADB)
    • jsc.exe (PID: 8104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe, ProcessId: 7672, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hepatoma
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeVirustotal: Detection: 54%Perma Link
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\dbs\sh\ddvsm\1002_165500_0\cmd\7\out\binaries\amd64ret\bin\amd64\VC7\VCPackages\VCConvertEngine.pdb source: is-10O82.tmp.4.dr
Source: Binary string: D:\dbs\sh\ddvsm\1002_165500_0\cmd\7\out\binaries\amd64ret\bin\amd64\VC7\VCPackages\VCConvertEngine.pdbOOGGCTL source: is-10O82.tmp.4.dr
Source: Binary string: /_/artifacts/obj/Microsoft.AspNetCore.Hosting/Release/net7.0/Microsoft.AspNetCore.Hosting.pdb source: is-QO0ON.tmp.4.dr
Source: Binary string: Microsoft.AspNetCore.Hosting.ni.pdb source: is-QO0ON.tmp.4.dr
Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.dr
Source: Binary string: Microsoft.AspNetCore.Http.Abstractions.ni.pdb source: is-K84DV.tmp.4.dr
Source: Binary string: D:\a\1\s\git-sdk-64\usr\src\build-extra\mingw-w64-wintoast\src\wintoast\example\console-example\x64\Release\WinToast Console Example.pdb* source: is-2DGHB.tmp.4.dr
Source: Binary string: /_/artifacts/obj/Microsoft.VisualStudio.LanguageServices.CSharp/Release/net472/Microsoft.VisualStudio.LanguageServices.CSharp.pdbSHA256 source: Microsoft.VisualStudio.LanguageServices.CSharp.dll.5.dr
Source: Binary string: D:\DynamicLinkMediaServer8\releases\2014.03\shared\adobe\dynamiclink\dynamiclinkui\lib\win\release\64\dynamiclinkui.pdb source: dynamiclinkui.dll.5.dr
Source: Binary string: /_/artifacts/obj/Microsoft.AspNetCore.Http.Abstractions/Release/net7.0/Microsoft.AspNetCore.Http.Abstractions.pdb source: is-K84DV.tmp.4.dr
Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.ExtendedClient\MS.TF.Lab.Client\Microsoft.TeamFoundation.Lab.Client.pdb source: Microsoft.TeamFoundation.Lab.Client.dll.5.dr
Source: Binary string: D:\a\1\s\git-sdk-64\usr\src\build-extra\mingw-w64-wintoast\src\wintoast\example\console-example\x64\Release\WinToast Console Example.pdb source: is-2DGHB.tmp.4.dr
Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr
Source: Binary string: /_/artifacts/obj/Microsoft.VisualStudio.LanguageServices.CSharp/Release/net472/Microsoft.VisualStudio.LanguageServices.CSharp.pdb source: Microsoft.VisualStudio.LanguageServices.CSharp.dll.5.dr
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://ccsca2021.ocsp-certum.com05
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: is-5MHEP.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://evcs-aia.ws.symantec.com/evcs.cer0
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://evcs-crl.ws.symantec.com/evcs.crl0
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://evcs-ocsp.ws.symantec.com04
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0A
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0C
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drString found in binary or memory: http://ocsp.sectigo.com0
Source: is-2DGHB.tmp.4.drString found in binary or memory: http://ocsp.sectigo.com0%
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://ocsp.thawte.com0
Source: AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://repository.certum.pl/ccsca2021.cer0
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0A
Source: AutoIt3.exe.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: AutoIt3.exe.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://subca.ocsp-certum.com01
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://subca.ocsp-certum.com02
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: http://subca.ocsp-certum.com05
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: is-20HF7.tmp.4.drString found in binary or memory: http://www.apple.com/DTDs/PropertyList-1.0.dtd
Source: AutoIt3.exe, 00000005.00000000.1439770894.0000000000645000.00000002.00000001.01000000.0000000E.sdmp, AutoIt3.exe, 00000007.00000000.1555121153.0000000000DF5000.00000002.00000001.01000000.0000000F.sdmp, AutoIt3.exe, 00000008.00000000.1643090234.0000000000DF5000.00000002.00000001.01000000.0000000F.sdmp, AutoIt3.exe.5.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: http://www.certum.pl/CPS0
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://www.symauth.com/cps0(
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://www.symauth.com/cps09
Source: dynamiclinkui.dll.5.drString found in binary or memory: http://www.symauth.com/rpa04
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: https://github.com/WinDirStat/WinDirStat0
Source: is-QO0ON.tmp.4.dr, is-K84DV.tmp.4.drString found in binary or memory: https://github.com/dotnet/aspnetcore
Source: is-QO0ON.tmp.4.dr, is-K84DV.tmp.4.drString found in binary or memory: https://github.com/dotnet/aspnetcore/tree/57512b49997283599b00a6b67d0ccebaec171daf
Source: Microsoft.VisualStudio.LanguageServices.CSharp.dll.5.drString found in binary or memory: https://github.com/dotnet/roslyn
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: https://jrsoftware.org/
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: https://jrsoftware.org0
Source: is-2DGHB.tmp.4.drString found in binary or memory: https://sectigo.com/CPS0
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: https://sectigo.com/CPS0D
Source: is-APKN7.tmp.4.dr, is-RERKN.tmp.4.drString found in binary or memory: https://tukaani.org/
Source: is-RERKN.tmp.4.drString found in binary or memory: https://tukaani.org/xz/
Source: is-RERKN.tmp.4.drString found in binary or memory: https://tukaani.org/xz/XZ
Source: AutoIt3.exe.5.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drString found in binary or memory: https://www.certum.pl/CPS0
Source: AutoIt3.exe.5.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: AutoIt3.exe.5.drString found in binary or memory: https://www.globalsign.com/repository/06
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drString found in binary or memory: https://www.innosetup.com/
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drString found in binary or memory: https://www.remobjects.com/ps
Source: Joe Sandbox ViewDropped File: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe 1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-APKN7.tmp.4.drStatic PE information: Number of sections : 11 > 10
Source: is-RERKN.tmp.4.drStatic PE information: Number of sections : 11 > 10
Source: is-N66KH.tmp.4.drStatic PE information: Number of sections : 11 > 10
Source: is-20HF7.tmp.4.drStatic PE information: Number of sections : 13 > 10
Source: is-QO0ON.tmp.4.drStatic PE information: No import functions for PE file found
Source: Microsoft.AspNetCore.Hosting.dll.5.drStatic PE information: No import functions for PE file found
Source: is-K84DV.tmp.4.drStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000000.00000000.1397486046.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000000.00000003.1398188138.000000007FB70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000000.00000003.1415551115.000000000228A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000000.00000003.1415551115.0000000002348000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000003.00000003.1445473078.0000000000AB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, 00000003.00000003.1445473078.00000000009FA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeBinary or memory string: OriginalFileName vs SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: mal60.evad.winEXE@17/54@0/0
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeFile created: C:\Users\user\AppData\Local\Temp\is-38S52.tmpJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeVirustotal: Detection: 54%
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: /LOADINF="filename"
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: -Helper process exited with failure code: 0x%x
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: -HelperRegisterTypeLibrary: StatusCode invalidU
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: /InstallOnThisVersion: Invalid MinVersion string
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeString found in binary or memory: /LoadInf=
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess created: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp "C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$20406,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe"
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp "C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$2040E,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe "C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe" hepatoma.a3x
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
Source: unknownProcess created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
Source: unknownProcess created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess created: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp "C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$20406,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp "C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$2040E,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe "C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe" hepatoma.a3xJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: version.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: winmm.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: mpr.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: wininet.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: userenv.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: version.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: winmm.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: mpr.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: wininet.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: userenv.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic file information: File size 15055834 > 1048576
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\dbs\sh\ddvsm\1002_165500_0\cmd\7\out\binaries\amd64ret\bin\amd64\VC7\VCPackages\VCConvertEngine.pdb source: is-10O82.tmp.4.dr
Source: Binary string: D:\dbs\sh\ddvsm\1002_165500_0\cmd\7\out\binaries\amd64ret\bin\amd64\VC7\VCPackages\VCConvertEngine.pdbOOGGCTL source: is-10O82.tmp.4.dr
Source: Binary string: /_/artifacts/obj/Microsoft.AspNetCore.Hosting/Release/net7.0/Microsoft.AspNetCore.Hosting.pdb source: is-QO0ON.tmp.4.dr
Source: Binary string: Microsoft.AspNetCore.Hosting.ni.pdb source: is-QO0ON.tmp.4.dr
Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: sqlite3.dll.5.dr, is-5MHEP.tmp.4.dr
Source: Binary string: Microsoft.AspNetCore.Http.Abstractions.ni.pdb source: is-K84DV.tmp.4.dr
Source: Binary string: D:\a\1\s\git-sdk-64\usr\src\build-extra\mingw-w64-wintoast\src\wintoast\example\console-example\x64\Release\WinToast Console Example.pdb* source: is-2DGHB.tmp.4.dr
Source: Binary string: /_/artifacts/obj/Microsoft.VisualStudio.LanguageServices.CSharp/Release/net472/Microsoft.VisualStudio.LanguageServices.CSharp.pdbSHA256 source: Microsoft.VisualStudio.LanguageServices.CSharp.dll.5.dr
Source: Binary string: D:\DynamicLinkMediaServer8\releases\2014.03\shared\adobe\dynamiclink\dynamiclinkui\lib\win\release\64\dynamiclinkui.pdb source: dynamiclinkui.dll.5.dr
Source: Binary string: /_/artifacts/obj/Microsoft.AspNetCore.Http.Abstractions/Release/net7.0/Microsoft.AspNetCore.Http.Abstractions.pdb source: is-K84DV.tmp.4.dr
Source: Binary string: D:\a\_work\1\obj\Release.AnyCPU\Tfs.ExtendedClient\MS.TF.Lab.Client\Microsoft.TeamFoundation.Lab.Client.pdb source: Microsoft.TeamFoundation.Lab.Client.dll.5.dr
Source: Binary string: D:\a\1\s\git-sdk-64\usr\src\build-extra\mingw-w64-wintoast\src\wintoast\example\console-example\x64\Release\WinToast Console Example.pdb source: is-2DGHB.tmp.4.dr
Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr
Source: Binary string: /_/artifacts/obj/Microsoft.VisualStudio.LanguageServices.CSharp/Release/net472/Microsoft.VisualStudio.LanguageServices.CSharp.pdb source: Microsoft.VisualStudio.LanguageServices.CSharp.dll.5.dr

Data Obfuscation

barindex
Source: is-QO0ON.tmp.4.dr, WebHostBuilder.cs.Net Code: BuildCommonServices
Source: is-QO0ON.tmp.4.dr, GenericWebHostBuilder.cs.Net Code: UseStartup
Source: is-K84DV.tmp.4.dr, UseMiddlewareExtensions.cs.Net Code: UseMiddleware
Source: Microsoft.AspNetCore.Hosting.dll.5.dr, WebHostBuilder.cs.Net Code: BuildCommonServices
Source: Microsoft.AspNetCore.Hosting.dll.5.dr, GenericWebHostBuilder.cs.Net Code: UseStartup
Source: is-QO0ON.tmp.4.drStatic PE information: 0xF0B1EC05 [Wed Dec 18 08:02:13 2097 UTC]
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeStatic PE information: section name: .didata
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.0.drStatic PE information: section name: .didata
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drStatic PE information: section name: .didata
Source: is-EO8R9.tmp.4.drStatic PE information: section name: .buildid
Source: is-EO8R9.tmp.4.drStatic PE information: section name: .xdata
Source: is-20HF7.tmp.4.drStatic PE information: section name: .xdata
Source: is-20HF7.tmp.4.drStatic PE information: section name: .debug
Source: is-APKN7.tmp.4.drStatic PE information: section name: .xdata
Source: is-N66KH.tmp.4.drStatic PE information: section name: .xdata
Source: is-2DGHB.tmp.4.drStatic PE information: section name: .msvcjmc
Source: is-2DGHB.tmp.4.drStatic PE information: section name: _RDATA
Source: is-RERKN.tmp.4.drStatic PE information: section name: .xdata

Persistence and Installation Behavior

barindex
Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple suspicious indicators: 1) The signature is explicitly marked as invalid with verification failure - this is a major red flag. 2) There's a significant time gap between compilation date (Sept 2020) and certificate issuance (July 2024), suggesting possible certificate abuse or backdating. 3) While the issuer Certum/Asseco is a legitimate CA, the subject is an individual developer rather than a company, which provides less accountability. 4) The signature validity period (July 2024-2025) is future-dated compared to compilation, which is illogical for legitimate software. The only positive aspect is that the location (US) and CA (Certum) are reputable. The invalid signature combined with temporal inconsistencies strongly suggests certificate manipulation or malicious intent.
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-9RDAH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.TeamFoundation.Lab.Client.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-TD0JT.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeFile created: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-2DGHB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-F8EF0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\vcconvertengine.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\lzmadec.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\libvorbis.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_iscrypt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-U0R5Q.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.VisualStudio.LanguageServices.CSharp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-EO8R9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-QO0ON.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Http.Abstractions.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\wintoast.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\tclsh.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeFile created: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\git-receive-pack.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.TeamFoundation.Lab.Client.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-APKN7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-K84DV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-10O82.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\xzcat.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\dynamiclinkui.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-5MHEP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_iscrypt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\vcconvertengine.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Hosting.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\libvorbis.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Hosting.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-H3IKH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\SSLeay.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\dynamiclinkui.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\SSLeay.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Http.Abstractions.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-RERKN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.VisualStudio.LanguageServices.CSharp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-20HF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeFile created: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\sqlite3.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpFile created: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-N66KH.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hepatomaJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hepatomaJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hepatomaJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hepatomaJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-5MHEP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_iscrypt.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-9RDAH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.TeamFoundation.Lab.Client.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-TD0JT.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\vcconvertengine.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-2DGHB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-F8EF0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Hosting.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\libvorbis.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\vcconvertengine.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\lzmadec.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\libvorbis.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_iscrypt.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Hosting.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.VisualStudio.LanguageServices.CSharp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-EO8R9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-QO0ON.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-H3IKH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Http.Abstractions.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\wintoast.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\tclsh.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\SSLeay.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\dynamiclinkui.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.TeamFoundation.Lab.Client.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\git-receive-pack.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\SSLeay.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-APKN7.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Http.Abstractions.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_isdecmp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-RERKN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-K84DV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-10O82.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.VisualStudio.LanguageServices.CSharp.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\xzcat.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-20HF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\sqlite3.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeDropped PE file which has not been started: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\dynamiclinkui.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-N66KH.tmpJump to dropped file
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: VMware
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: <QueryVirtualMachines>b__0
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: CreateLabTemplateFromVirtualMachine
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: CreateLabEnvironmentFromVirtualMachines
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: filterAlreadyImportedVirtualMachines
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: <GetVirtualMachine>b__0
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: VirtualMachineQuerySpec
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: virtualMachineGuid
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: VirtualMachineState
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: set_FilterAlreadyImportedVirtualMachines
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: libLocationUrinameGCreateLabTemplateFromVirtualMachine
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: libLocationSpec;QueryTeamProjectLibraryShares)labTemplateQuerySpec#QueryLabTemplatesUteamProjectCollectionLibraryShareQuerySpecOQueryTeamProjectCollectionLibrarySharesOteamProjectCollectionHostGroupQuerySpecIQueryTeamProjectCollectionHostGroups/virtualMachineQuerySpec)QueryVirtualMachines9ListTeamProjectLibraryShares3ListTeamProjectHostGroups'ListLabEnvironments5teamProjectLibraryShareUri!ListLabTemplates%virtualMachineGuid
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: virtualMachineTemplateQuerySpec
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: virtualMachineQuerySpec
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: get_VirtualMachineGuid
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: locationUri#GetVirtualMachineIGetTeamProjectCollectionLibraryShareCGetTeamProjectCollectionHostGroup#labEnvironmentUri/GetIsolationInformation!GetSnapshotChain9GetValidPermissionsForObject%labEnvironmentSpec)QueryLabEnvironments
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: labTemplateUri#UpdateLabTemplate#DeleteLabTemplate=CreateLabTemplateFromLabSystem1labEnvironmentDefinition)CreateLabEnvironment7virtualSystemDefinitionListOCreateLabEnvironmentFromVirtualMachines)UpdateLabEnvironment)DeleteLabEnvironment/teamProjectHostGroupUri9CloneAndDeployLabEnvironmentWCloneDeployAndRestoreLabEnvironmentSnapshot)RepairLabEnvironment'StartLabEnvironment%StopLabEnvironment-ShutdownLabEnvironment'PauseLabEnvironment7CloneAndStoreLabEnvironment
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: <CreateLabEnvironmentFromVirtualMachines>b__0
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: VirtualMachineCollectionFromXml
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: virtualMachine
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: virtualMachineId
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: set_VirtualMachineGuid
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: <CreateLabTemplateFromVirtualMachine>b__0
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: QueryVirtualMachines
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: GetVirtualMachine
Source: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000002.1414156977.000000000073F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\n
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: DisabledIFilterAlreadyImportedVirtualMachines
Source: Microsoft.TeamFoundation.Lab.Client.dll.5.drBinary or memory string: get_FilterAlreadyImportedVirtualMachines
Source: C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 920000 protect: page execute and read and writeJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 500000 protect: page execute and read and writeJump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 1100000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmpProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
Source: AutoIt3.exe, 00000005.00000000.1439690573.0000000000631000.00000002.00000001.01000000.0000000E.sdmp, AutoIt3.exe, 00000007.00000000.1554875109.0000000000DE1000.00000002.00000001.01000000.0000000F.sdmp, AutoIt3.exe, 00000008.00000000.1643017056.0000000000DE1000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
112
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Software Packing
LSASS Memory2
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
112
Process Injection
Security Account Manager2
System Owner/User Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1631970 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 07/03/2025 Architecture: WINDOWS Score: 60 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 AI detected suspicious PE digital signature 2->69 10 SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe 2 2->10         started        13 AutoIt3.exe 2->13         started        16 AutoIt3.exe 2->16         started        process3 file4 45 SecuriteInfo.com.W...gen.14270.13618.tmp, PE32 10->45 dropped 18 SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp 3 15 10->18         started        71 Allocates memory in foreign processes 13->71 21 jsc.exe 13->21         started        23 jsc.exe 16->23         started        signatures5 process6 file7 37 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->37 dropped 39 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 18->39 dropped 41 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 18->41 dropped 25 SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe 2 18->25         started        process8 file9 43 SecuriteInfo.com.W...gen.14270.13618.tmp, PE32 25->43 dropped 28 SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp 5 33 25->28         started        process10 file11 47 C:\Users\user\AppData\...\AutoIt3.exe (copy), PE32 28->47 dropped 49 C:\Users\user\...\vcconvertengine.dll (copy), PE32+ 28->49 dropped 51 C:\Users\user\AppData\...\sqlite3.dll (copy), PE32+ 28->51 dropped 53 30 other files (none is malicious) 28->53 dropped 31 AutoIt3.exe 1 13 28->31         started        process12 file13 55 C:\...\AutoIt3.exe, PE32 31->55 dropped 57 C:\...\vcconvertengine.dll, PE32+ 31->57 dropped 59 C:\...\sqlite3.dll, PE32+ 31->59 dropped 61 7 other files (none is malicious) 31->61 dropped 63 Allocates memory in foreign processes 31->63 35 jsc.exe 31->35         started        signatures14 process15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe55%VirustotalBrowse
SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe50%ReversingLabsWin32.Spyware.Lummastealer
SourceDetectionScannerLabelLink
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Hosting.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.AspNetCore.Http.Abstractions.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.TeamFoundation.Lab.Client.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Microsoft.VisualStudio.LanguageServices.CSharp.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\SSLeay.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\dynamiclinkui.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\libvorbis.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\sqlite3.dll0%ReversingLabs
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\vcconvertengine.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_iscrypt.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_isdecmp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-8OTK2.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_iscrypt.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_isdecmp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SITTS.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Hosting.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.AspNetCore.Http.Abstractions.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.TeamFoundation.Lab.Client.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\Microsoft.VisualStudio.LanguageServices.CSharp.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\SSLeay.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\git-receive-pack.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-20HF7.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-2DGHB.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-APKN7.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-N66KH.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\is-RERKN.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\lzmadec.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\tclsh.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\wintoast.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\bin\xzcat.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\dynamiclinkui.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-10O82.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-5MHEP.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-9RDAH.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-EO8R9.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-F8EF0.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-H3IKH.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-K84DV.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-QO0ON.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-TD0JT.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\is-U0R5Q.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\libvorbis.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\sqlite3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\vcconvertengine.dll (copy)0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://tukaani.org/0%Avira URL Cloudsafe
http://ocsp.sectigo.com0%0%Avira URL Cloudsafe
http://subca.ocsp-certum.com010%Avira URL Cloudsafe
https://tukaani.org/xz/XZ0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
    high
    http://repository.certum.pl/ctsca2021.cer0ASecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
      high
      http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
        high
        https://sectigo.com/CPS0is-2DGHB.tmp.4.drfalse
          high
          http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
            high
            http://repository.certum.pl/cscasha2.cer0SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
              high
              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0is-2DGHB.tmp.4.drfalse
                high
                http://ocsp.sectigo.com0SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drfalse
                  high
                  http://www.symauth.com/cps09dynamiclinkui.dll.5.drfalse
                    high
                    http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                      high
                      http://ocsp.thawte.com0dynamiclinkui.dll.5.drfalse
                        high
                        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#is-2DGHB.tmp.4.drfalse
                          high
                          http://ccsca2021.crl.certum.pl/ccsca2021.crl0sSecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                            high
                            http://www.autoitscript.com/autoit3/XAutoIt3.exe, 00000005.00000000.1439770894.0000000000645000.00000002.00000001.01000000.0000000E.sdmp, AutoIt3.exe, 00000007.00000000.1555121153.0000000000DF5000.00000002.00000001.01000000.0000000F.sdmp, AutoIt3.exe, 00000008.00000000.1643090234.0000000000DF5000.00000002.00000001.01000000.0000000F.sdmp, AutoIt3.exe.5.drfalse
                              high
                              http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#is-2DGHB.tmp.4.drfalse
                                high
                                https://www.certum.pl/CPS0SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                  high
                                  https://github.com/dotnet/roslynMicrosoft.VisualStudio.LanguageServices.CSharp.dll.5.drfalse
                                    high
                                    https://github.com/dotnet/aspnetcoreis-QO0ON.tmp.4.dr, is-K84DV.tmp.4.drfalse
                                      high
                                      https://www.autoitscript.com/autoit3/AutoIt3.exe.5.drfalse
                                        high
                                        http://www.symauth.com/cps0(dynamiclinkui.dll.5.drfalse
                                          high
                                          http://crl.certum.pl/cscasha2.crl0qSecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                            high
                                            http://repository.certum.pl/ccsca2021.cer0SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                              high
                                              http://cscasha2.ocsp-certum.com04SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                high
                                                http://ocsp.sectigo.com0%is-2DGHB.tmp.4.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drfalse
                                                  high
                                                  http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yis-2DGHB.tmp.4.drfalse
                                                    high
                                                    http://crl.thawte.com/ThawteTimestampingCA.crl0dynamiclinkui.dll.5.drfalse
                                                      high
                                                      http://subca.ocsp-certum.com05SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                        high
                                                        https://tukaani.org/xz/is-RERKN.tmp.4.drfalse
                                                          high
                                                          https://www.remobjects.com/psSecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drfalse
                                                            high
                                                            https://github.com/WinDirStat/WinDirStat0SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                              high
                                                              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.dr, is-2DGHB.tmp.4.drfalse
                                                                high
                                                                http://subca.ocsp-certum.com02SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                                  high
                                                                  https://tukaani.org/is-APKN7.tmp.4.dr, is-RERKN.tmp.4.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://subca.ocsp-certum.com01SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://www.innosetup.com/SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp.3.drfalse
                                                                    high
                                                                    https://sectigo.com/CPS0DSecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                                      high
                                                                      http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                                        high
                                                                        http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                                          high
                                                                          https://jrsoftware.org0SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                                            high
                                                                            https://jrsoftware.org/SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                                              high
                                                                              http://ccsca2021.ocsp-certum.com05SecuriteInfo.com.Win32.Malware-gen.14270.13618.exefalse
                                                                                high
                                                                                http://www.symauth.com/rpa04dynamiclinkui.dll.5.drfalse
                                                                                  high
                                                                                  https://github.com/dotnet/aspnetcore/tree/57512b49997283599b00a6b67d0ccebaec171dafis-QO0ON.tmp.4.dr, is-K84DV.tmp.4.drfalse
                                                                                    high
                                                                                    http://www.certum.pl/CPS0SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000002.00000003.1411566962.00000000023F3000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp, 00000004.00000003.1442389664.0000000002473000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe, _isdecmp.dll.4.dr, _isdecmp.dll.2.drfalse
                                                                                      high
                                                                                      https://tukaani.org/xz/XZis-RERKN.tmp.4.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      No contacted IP infos
                                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                                      Analysis ID:1631970
                                                                                      Start date and time:2025-03-07 17:58:50 +01:00
                                                                                      Joe Sandbox product:CloudBasic
                                                                                      Overall analysis duration:0h 8m 17s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:full
                                                                                      Cookbook file name:default.jbs
                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                      Number of analysed new started processes analysed:14
                                                                                      Number of new started drivers analysed:0
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:0
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Sample name:SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                      Detection:MAL
                                                                                      Classification:mal60.evad.winEXE@17/54@0/0
                                                                                      EGA Information:Failed
                                                                                      HCA Information:
                                                                                      • Successful, ratio: 100%
                                                                                      • Number of executed functions: 0
                                                                                      • Number of non-executed functions: 0
                                                                                      Cookbook Comments:
                                                                                      • Found application associated with file extension: .exe
                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, conhost.exe
                                                                                      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, c.pki.goog
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                      TimeTypeDescription
                                                                                      12:00:43API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp modified
                                                                                      18:00:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce hepatoma "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
                                                                                      18:00:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce hepatoma "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
                                                                                      No context
                                                                                      No context
                                                                                      No context
                                                                                      No context
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exeicernWzgk6.exeGet hashmaliciousAsyncRATBrowse
                                                                                        UI19UVUDOTXM3078IUTTFRFNK.exeGet hashmaliciousUnknownBrowse
                                                                                          Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                            Exploit Locator.exeGet hashmaliciousPureCrypterBrowse
                                                                                              Ja49WogyXz.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                                                                                                Ja49WogyXz.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                                                                                                  setup_patched.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                    epg7xcMIYc.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                                                                                                      w9OR6Y9uhh.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                                                                                                        epg7xcMIYc.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):943784
                                                                                                          Entropy (8bit):6.621472142472864
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                                          MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                                          SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                                          SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                                          Malicious:true
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Joe Sandbox View:
                                                                                                          • Filename: icernWzgk6.exe, Detection: malicious, Browse
                                                                                                          • Filename: UI19UVUDOTXM3078IUTTFRFNK.exe, Detection: malicious, Browse
                                                                                                          • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                          • Filename: Exploit Locator.exe, Detection: malicious, Browse
                                                                                                          • Filename: Ja49WogyXz.exe, Detection: malicious, Browse
                                                                                                          • Filename: Ja49WogyXz.exe, Detection: malicious, Browse
                                                                                                          • Filename: setup_patched.exe, Detection: malicious, Browse
                                                                                                          • Filename: epg7xcMIYc.exe, Detection: malicious, Browse
                                                                                                          • Filename: w9OR6Y9uhh.exe, Detection: malicious, Browse
                                                                                                          • Filename: epg7xcMIYc.exe, Detection: malicious, Browse
                                                                                                          Reputation:moderate, very likely benign file
                                                                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):432400
                                                                                                          Entropy (8bit):6.518681704222088
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:Wu2eOgw2qGi4IM+iYww/lBEfg6bl/NdZuy+O16oas7DK:Wnerw2qGi4/+rtqf7Nl16oN72
                                                                                                          MD5:A85C5098BB6D4FC152869A3681849F81
                                                                                                          SHA1:49505665A1D199C686F5D27716A085F221AE3793
                                                                                                          SHA-256:18A225164AAA324BC785D443416A8B3BB57FC7822FDB8B23B7AD692A2C4FF478
                                                                                                          SHA-512:C52C9323660A65C5418AEB0641B79684E4FDA8B675701C4421C0F5E68D1867EEB508B22D9D6EB2E1D78DEB576BCEDCEFA6571FCFECA4840DC28A328E59145031
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................" .........................................................p......V1....`...@......@............... ..................................0...H...\+...p...)...`..`...0*..p...........................................................0...H............text.............................. ..`.data...k...........................@....reloc..`....`.......`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):309512
                                                                                                          Entropy (8bit):6.551022972825533
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:fsKY179H8S9jd2V8p4WYSaUawMvwE3Ir+LT9:kKY179HN9jd08p+SaUawMvC8T9
                                                                                                          MD5:B2908E14C0D7F18F6C22C9F735E16C5D
                                                                                                          SHA1:FF0A4D26967EB9BCB5C7B2547FDE8EDDE826E499
                                                                                                          SHA-256:BBA4D547FD828A42D2D4F841D23ABB571628881B3DD3EB03F275865502D4E0BC
                                                                                                          SHA-512:293035B322CF3A0FBBEB06E5A92AB8E7B38CCB7FBAE692D50F1CD8C72E1803C12CF0D83DF1B76C10AC1033E258731EA1FF17CA981F06B83D58911E3D719B8CC3
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...CH............" ..... ...`......................................................K.....`...@......@............... ......................................._...'.......)...........%..p...............................................................H............text...'........ .................. ..`.data....K...0...P...0..............@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):258448
                                                                                                          Entropy (8bit):6.142404197134023
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:wHBHBsyAUKhqstIJCdVHpa68JCJozMKSPPj/RlgSqHDqv+2LAItbBe2bD3T+eGQ2:iDAUaqstYgVoJERlrq4Q2bD3TVFpE
                                                                                                          MD5:350415C34E30A70A4E9AAEB5F3D0415D
                                                                                                          SHA1:1462DA8706C00145E380AE6237B254E23C6FF2FC
                                                                                                          SHA-256:FAD1EBD6EAE791E0CA49A4EA7E5FFDCE6CA70815D5A2CCCB74BE58F7C6E773F2
                                                                                                          SHA-512:AB7269512DE5D7B4CB798AF4D0057F2B1411DACD7841FF74814257A52C28E13CF574543DC84C9F01CECCBC65E0E983D75A9B2121E281CA9841690C2262854EA9
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.........." ..0.................. ........... ....................... .......4....`.................................X...O........................'.......... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........S...h............... .. ........................................0..$..........,..o ....o!...(.....o"...s#.....*.0..q........($...,..*s%....s&......(....(....o'....s(....()....o*.........io+....o,....o-...(.........,..o/.....,..o/......*...........,Z..........Nd.......0..q........($...,..*s%....s&......(....(....o0....s(.....(1.........io+....o,...()....o-...o2........,..o/.....,..o/......*...........,Z..........Nd......N.......%.]...(3...*N.......%.^...(3...*..(4...*
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):552720
                                                                                                          Entropy (8bit):6.193425702025458
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:5rq0npku+cIUIIIIqIByf6H6oWK/V/eYiY81aAekEbAS4WFoRd:Nq0IV1a1mf
                                                                                                          MD5:4F396AE35A51DFDFA58BF0B85589FE69
                                                                                                          SHA1:1D8CAE28637A1447530EAA5566EF04E37F45A2CB
                                                                                                          SHA-256:91161657954B9DD8A11350D7ABE63D1813E2C0EE19341E86CCE7C0546883C520
                                                                                                          SHA-512:FAB369ED23F2DBD3EDBFB4F6FA35C5571B3C4DDDD33D917D9BD709A78E8432F5FF9849A0DF4B3149BEA9D0A4C482B202EECFEB7CD935D3ED4519B71D33A1FCAE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....8..........." ..0......D........... ... ....... ...............................M....`.................................-...O.... ..0A...........F...)..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...0A... ...B..................@..@.reloc...............D..............@..B................a.......H...........\...............z............................................([...*^.([..........%...}....*:.([.....}....*:.([.....}....*:.([.....}....*J.(\...}.....(]...*.r...p*..**....(^...*..{....*V...(_...,....(`...*.*..0..x...........T..(a....+^..(b...%{c....{d......_.........(e........(f...og.......(h...,...(i........,...J.`T..+...J..`T..(j...-..*~~....%-.&.....(e...sk...%.....*.~....*.......*F(.....(....ol...*2r...p.(....*2r...p.(....*2r1..p.(....*2rO..p.(....*2r...p.(...
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):467362
                                                                                                          Entropy (8bit):6.336963725113838
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:KcV+xVmh4ies+zgmZ4mpvW/CvTCuNbKrfLk:tVgkLkDZ4mpvW/Cv7NSLk
                                                                                                          MD5:01C3CA44C13782665EC47DF17B6EE30F
                                                                                                          SHA1:14A0B7623AAFB05CA7E62E511D404912DFC4CBD7
                                                                                                          SHA-256:3A9C1BE879B908B0F73D1EB23066F2BB65AF7D1A238508B11235260DE12AE43B
                                                                                                          SHA-512:8976A42CA14F662F602E3577D16FD4F3438C46E5F94E1D9E1A5AF21AFAD566A5A64B561CD962FB40BF5D21E59E33E1C5069248AB1A47EB65C0BEE4AA6BA9B29E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............p........................................0................ ..................................................t........... ..( ........... ..(...................................................l................................text...(...........................`..`.data...`.... ......................@....rdata..d....0......................@..@.buildid5...........................@..@.pdata..( ... ..."..................@..@.xdata...,...P......................@..@.bss.....................................edata...............,..............@..@.idata...t.......v...2..............@....reloc..(.... ......................@..B................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):587976
                                                                                                          Entropy (8bit):6.271308976719428
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:3YMdyzCI6sNyAB6p9XiD1MgE8LV4ihf2ruV:3YMQzCI6sNyAB6p9Xi5Mg5ppV
                                                                                                          MD5:1E8030AA264522F0D9B4CABD6787807F
                                                                                                          SHA1:55CA1AA6015D34BF668462ECCE1EB4A09302165C
                                                                                                          SHA-256:0B31C371CA1247A8D5451752D17DB277FA3C73A2D85FE0C6ECBB817A3A9A7CC5
                                                                                                          SHA-512:F346AEED94BE537D8311439BA8FF25D04952E8B3C95D5CCF63D683765DD28A59B18700BAF8415E278AB24533F08F83DADE102F5D5328C0961943B50226A21A89
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........N..N..N....D.O..!.B.O..!.v.B..!.w.K..!.@.J..G.O.J..U?@.C..N....U?w.B..U?G.O..U?F.O..N.K.O..U?A.O..RichN..........PE..d.....VS.........." ................H.........@.........................................................................................>5..............,....p...O..............<...p...................................................H............................text............................... ..`.rdata..............................@..@.data...hQ.......J..................@....pdata...O...p...P...J..............@..@.rsrc...,........0..................@..@.reloc..6...........................@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):956534
                                                                                                          Entropy (8bit):7.999814042116966
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:24576:X5oJRN77Llx1dqcHd7xbDyJaCqd+0Sn6KJIIq:SJHfLlx1XHd7EqzSpJq
                                                                                                          MD5:C21852AD208CFF5D9B8BFA2C1C5CDFD9
                                                                                                          SHA1:28C771120CF403060D900C811AD4ABD7A88DA2BC
                                                                                                          SHA-256:081F7C327AE141C1D9CDE2E4964D89AE498CBF3E4561DAC3551A2038C86A40C9
                                                                                                          SHA-512:5CBC0D255AD23A828E0E0FD614CE3E274A81E73CD717DF2FD452D192C361ECDE5AA46F39526E1BE834D9B51C30123C6DDD828493CFB5F9E7C3B3BFBC590F479E
                                                                                                          Malicious:false
                                                                                                          Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D.............................kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..,..f.....'......b~.........>...Q............K...m.......`..5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.D.U.u..\y>).1A?..2..a....'s......'....lbU.B..\..?N..~...Y..p.....2v...k..?..C.~..Q..K...p+.D:.....'...%.S.B~]......t.XHB..?..l.h....r.m^p...yY....TN..o.q.l.I.6t.fv.....+|nR.i..5].xM..Jr..o1......J..rOL.|.".c........K.o.C....Km.o.4..V.......g..j.p....X .1r..e'..DA.M]..'..c...z..3..S$....l.^.8.Pq.Z.i0.P...\.h.~]=....P....A....Z...M..%...yH...0.&7......ew..=..X....m..V.HS.......r.4.).8..SVsr..@.?@A...MA.p.`D.
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):5270528
                                                                                                          Entropy (8bit):7.999967052422753
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:98304:gulAWcONLaxoYSdUlDFtlSySqd73VvTKMbsx/nSIu+kJJEYNK9O4WX83AlsAe9:gbpONLaWDqF25qdRvTKNx/nSIu+MEYNw
                                                                                                          MD5:D05B3CE7189BE0C71DFD407601470657
                                                                                                          SHA1:D87728047A016ED9C75A5976A2BC54DEEF869DA5
                                                                                                          SHA-256:455856CD8AB90F56303A47CFC5567757EAB6847A3A2F8E282F7C91A87874021A
                                                                                                          SHA-512:24EABE9F4FA093DECBE5697844FF102283EF7BFB10240C8D7CE4CC80F0182BD909CA7204B86ADA44591AE89DA760EEF805080F752F5954E20DCF4D95C35C7A0F
                                                                                                          Malicious:false
                                                                                                          Preview:......2.Rk..`HTk..a....W....%.........M...;.= ....5.Hrzy.}......|..i..HO%./.S........f..06.^>..c."........EjPqxg..zW!=E/.A.Z.7"..sKA.....C...j.6...<>?ZD!.[D..!P......OH..B...-s. ..U..S....Oy....<R..xO.wc.>.!......q:.1..]....@.e.`&[3...:....C.v.....GPTr..WO...c^..?.[."s\V~PO.R.<'..#....I........A.t.\......".p....R#W....._zY.. .4.}..^`.A..mrg~~..c...6..../w....zr?.a..&;.....gI)..x..A3..I}.......[..'&>G....n.._I..B..+.1^.q.*......$6.l....=rS...d...0....;.._G..b...^.S4yi......~..F.0.se#..>..g.>.L.-["R.]....?Z8......Z.`..V..3....5...`9....(...(a...*.....Y.A..,...Qa.P.-..) /.D.Ze3g.^..C...=..l].)rMy...y3.J_.....i.....Ye.#q}o..`jJ...../...0\.C8...........r...(kp.b.........8.....2rB.k..}H.r.}z*..[.|.b)>.....m..M.;rC...T8....g..v..\...r0......M?.....)D.$.*.a."E..iI..h.6...%hfp.6o.<...5..P...6*....k .$.F.}/..{!8M}7^.3.-Ed!.*..v1..>`.V.l&3UEe....k=.e..+.z.....a.....e..^J=:b.{&.y.....3.{.a..s.i........7?..(M..d4.@OY.X....a....q..|.RF....u:\ .....
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):745472
                                                                                                          Entropy (8bit):4.631856841972111
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:SnvEtL820xkcQLNFAz8xF39aIRcfcdE1:SMH0xkcQRFAzoF39BRckdO
                                                                                                          MD5:48167B3C5EF3CDF3E5B3B4705E4630BB
                                                                                                          SHA1:6C90ABEDFD30817F4A44FC98BB52E3C8FC3D778D
                                                                                                          SHA-256:EDE62B125CB04AECCA726D7B70A968998F900A3A46F4A7F2080963C19F2D8526
                                                                                                          SHA-512:C16A4D1432CBAC8D3179BDB98D2FFC02AD150CFAE621B19B03C4BCDBF4554540B1BC9EC2669FB5CE2FA6A4419C3B3F0031A464188B20D3DD9FC2E8F862B2CC32
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.'.z.I.z.I.z.I.s...r.I..H.x.I..L.v.I..M.}.I..J.y.I.1.H.x.I.c.H.y.I.z.H.G.I.c.A.o.I.c.I.{.I.c...{.I.c.K.{.I.Richz.I.........................PE..d...C].d.........." ...$.....P...... .....................................................`..........................................,.......2.......p.......P..................<.......8...............................@............ ...............................text............................... ..`.rdata..v.... ......................@..@.data........@.......*..............@....pdata.......P.......,..............@..@.rsrc........p.......>..............@..@.reloc..<........ ...@..............@..B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1474328
                                                                                                          Entropy (8bit):6.576449104458348
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:zgrcmts/1JjOShWKGgO9HNnKN0XakMcIdplDUxM3Hgj1Smut9Hkz1Rr4af:Zks9pOShVGgO9HNagakMcIFIsHgj1Smz
                                                                                                          MD5:35F55E2AD0AE11A273408CFEFF75B1AB
                                                                                                          SHA1:672BFF2DEA4351E1245806E6AF7F1BE5DA9DD055
                                                                                                          SHA-256:919572560C314E46B1DBA56418BBB50E1620C0AF328AEC394EAFF580C58F2FC5
                                                                                                          SHA-512:B84A42B42A710CD5FE91DEF37207200141A03A8E93488D05099115F16961255248AA74C3A9800A82A0C4EB79348B570CA1A2BFA4E3168B5359CE063A688D26A4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C3;..RU..RU..RU..*..RU.H.T..RU.H.P..RU.H.Q..RU.H.V..RU.L*T..RU..RT..RU...]..RU...U..RU......RU...W..RU.Rich.RU.........................PE..d...K.,d.........." ...".`...........c..............................................$.....`.............................................."...%.......p...............P.../..............T...............................@............p..(............................text...X^.......`.................. ..`.rdata..$....p.......d..............@..@.data....F...@...>...(..............@....pdata...............f..............@..@.rsrc........p.......8..............@..@.reloc...............B..............@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):417824
                                                                                                          Entropy (8bit):6.255715260407707
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:glP8IV8p0U9lTKlF35G9cf2nXihL4nKIkm4Psxv+LYvPYys:kR8p19UlFQ984np4Psxv+J
                                                                                                          MD5:A90F1FEBEAB9A2FEAA5744CC353C4D99
                                                                                                          SHA1:A7EC880C320B681D9EBFA979FBBBB2A74D15C2AA
                                                                                                          SHA-256:A9D2A2C4530BD3A3BD46115A403A6CEAED226530B2297C44BD8332A6612E1F9A
                                                                                                          SHA-512:B8DDACAE4D076CA068B67A06FA4CF83670C21F0E316AEABC7E084D3259341619640C453374CE480B11E72DC09E5B139B61E618196CF3DFA5886E4418593978DD
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........p!...O..O..O.i...O..mN..O..mJ..O..mK..O..mL..O.z...O.z...O..N.o.O.z...O.cmO..O.cmF..O.cm...O.cmM..O.Rich..O.........PE..d....b.e.........." ...".....................................................p...........`A.........................................................P.......0..0....8.. (...`..D....<..p....................=..(....;..@............................................text............................... ..`.rdata........... ..................@..@.data...x/......."..................@....pdata..0....0... ..................@..@.rsrc........P.......(..............@..@.reloc..D....`.......0..............@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3014144
                                                                                                          Entropy (8bit):6.394100396380623
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:49152:QLJwSihjOb6GLb4SKEs3DyOMC2DlgwccAP8SOHxVkTE0:swSi0b67zeC/wccAP85H
                                                                                                          MD5:83931244392565631DFD4E62A33C5840
                                                                                                          SHA1:BB8E4A04D4C820F4EA2041E1B8DF3BE60EF942F5
                                                                                                          SHA-256:352B24657604B9CD4D26DD6939A05E93110502C8F5E6DDEF3726A9EF665705A6
                                                                                                          SHA-512:0BB7318A9452120EC48EB51E0932B2D8603F8A9226CC61F4D87EC347AF76488DCD1180D9AC023A93E40FE04F310344377ECB84B784B962E888A27F07061C51D5
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....]_.................$,.........P6,......@,...@.......................................@......@....................-......`-.49....-.......................................................-......................i-.......-......................text...0.+.......+................. ..`.itext..t(....,..*....+............. ..`.data.......@,......(,.............@....bss.....x....,..........................idata..49...`-..:....,.............@....didata.......-.......,.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc.........-.......-.............@..@......................-.............@..@........................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):2560
                                                                                                          Entropy (8bit):2.8818118453929262
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                          MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):29472
                                                                                                          Entropy (8bit):7.042110181107409
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:BD7FEAbd+EDsIOmF+OiR9rikW/F+M9OAriXiRQU:M07sIOYRiPWkWNl9WXil
                                                                                                          MD5:077CB4461A2767383B317EB0C50F5F13
                                                                                                          SHA1:584E64F1D162398B7F377CE55A6B5740379C4282
                                                                                                          SHA-256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64
                                                                                                          SHA-512:B1FCB0265697561EF497E6A60FCEE99DC5EA0CF02B4010DA9F5ED93BCE88BDFEA6BFE823A017487B8059158464EA29636AAD8E5F9DD1E8B8A1B6EAAAB670E547
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(....................4.. ?...@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):6144
                                                                                                          Entropy (8bit):4.720366600008286
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                          MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                          SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                          SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                          SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3014144
                                                                                                          Entropy (8bit):6.394100396380623
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:49152:QLJwSihjOb6GLb4SKEs3DyOMC2DlgwccAP8SOHxVkTE0:swSi0b67zeC/wccAP85H
                                                                                                          MD5:83931244392565631DFD4E62A33C5840
                                                                                                          SHA1:BB8E4A04D4C820F4EA2041E1B8DF3BE60EF942F5
                                                                                                          SHA-256:352B24657604B9CD4D26DD6939A05E93110502C8F5E6DDEF3726A9EF665705A6
                                                                                                          SHA-512:0BB7318A9452120EC48EB51E0932B2D8603F8A9226CC61F4D87EC347AF76488DCD1180D9AC023A93E40FE04F310344377ECB84B784B962E888A27F07061C51D5
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....]_.................$,.........P6,......@,...@.......................................@......@....................-......`-.49....-.......................................................-......................i-.......-......................text...0.+.......+................. ..`.itext..t(....,..*....+............. ..`.data.......@,......(,.............@....bss.....x....,..........................idata..49...`-..:....,.............@....didata.......-.......,.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc.........-.......-.............@..@......................-.............@..@........................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):2560
                                                                                                          Entropy (8bit):2.8818118453929262
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                          MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):29472
                                                                                                          Entropy (8bit):7.042110181107409
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:BD7FEAbd+EDsIOmF+OiR9rikW/F+M9OAriXiRQU:M07sIOYRiPWkWNl9WXil
                                                                                                          MD5:077CB4461A2767383B317EB0C50F5F13
                                                                                                          SHA1:584E64F1D162398B7F377CE55A6B5740379C4282
                                                                                                          SHA-256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64
                                                                                                          SHA-512:B1FCB0265697561EF497E6A60FCEE99DC5EA0CF02B4010DA9F5ED93BCE88BDFEA6BFE823A017487B8059158464EA29636AAD8E5F9DD1E8B8A1B6EAAAB670E547
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(....................4.. ?...@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):6144
                                                                                                          Entropy (8bit):4.720366600008286
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                          MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                          SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                          SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                          SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):943784
                                                                                                          Entropy (8bit):6.621472142472864
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                                          MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                                          SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                                          SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                                          Malicious:true
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):432400
                                                                                                          Entropy (8bit):6.518681704222088
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:Wu2eOgw2qGi4IM+iYww/lBEfg6bl/NdZuy+O16oas7DK:Wnerw2qGi4/+rtqf7Nl16oN72
                                                                                                          MD5:A85C5098BB6D4FC152869A3681849F81
                                                                                                          SHA1:49505665A1D199C686F5D27716A085F221AE3793
                                                                                                          SHA-256:18A225164AAA324BC785D443416A8B3BB57FC7822FDB8B23B7AD692A2C4FF478
                                                                                                          SHA-512:C52C9323660A65C5418AEB0641B79684E4FDA8B675701C4421C0F5E68D1867EEB508B22D9D6EB2E1D78DEB576BCEDCEFA6571FCFECA4840DC28A328E59145031
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................" .........................................................p......V1....`...@......@............... ..................................0...H...\+...p...)...`..`...0*..p...........................................................0...H............text.............................. ..`.data...k...........................@....reloc..`....`.......`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):309512
                                                                                                          Entropy (8bit):6.551022972825533
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:fsKY179H8S9jd2V8p4WYSaUawMvwE3Ir+LT9:kKY179HN9jd08p+SaUawMvC8T9
                                                                                                          MD5:B2908E14C0D7F18F6C22C9F735E16C5D
                                                                                                          SHA1:FF0A4D26967EB9BCB5C7B2547FDE8EDDE826E499
                                                                                                          SHA-256:BBA4D547FD828A42D2D4F841D23ABB571628881B3DD3EB03F275865502D4E0BC
                                                                                                          SHA-512:293035B322CF3A0FBBEB06E5A92AB8E7B38CCB7FBAE692D50F1CD8C72E1803C12CF0D83DF1B76C10AC1033E258731EA1FF17CA981F06B83D58911E3D719B8CC3
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...CH............" ..... ...`......................................................K.....`...@......@............... ......................................._...'.......)...........%..p...............................................................H............text...'........ .................. ..`.data....K...0...P...0..............@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):258448
                                                                                                          Entropy (8bit):6.142404197134023
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:wHBHBsyAUKhqstIJCdVHpa68JCJozMKSPPj/RlgSqHDqv+2LAItbBe2bD3T+eGQ2:iDAUaqstYgVoJERlrq4Q2bD3TVFpE
                                                                                                          MD5:350415C34E30A70A4E9AAEB5F3D0415D
                                                                                                          SHA1:1462DA8706C00145E380AE6237B254E23C6FF2FC
                                                                                                          SHA-256:FAD1EBD6EAE791E0CA49A4EA7E5FFDCE6CA70815D5A2CCCB74BE58F7C6E773F2
                                                                                                          SHA-512:AB7269512DE5D7B4CB798AF4D0057F2B1411DACD7841FF74814257A52C28E13CF574543DC84C9F01CECCBC65E0E983D75A9B2121E281CA9841690C2262854EA9
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.........." ..0.................. ........... ....................... .......4....`.................................X...O........................'.......... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........S...h............... .. ........................................0..$..........,..o ....o!...(.....o"...s#.....*.0..q........($...,..*s%....s&......(....(....o'....s(....()....o*.........io+....o,....o-...(.........,..o/.....,..o/......*...........,Z..........Nd.......0..q........($...,..*s%....s&......(....(....o0....s(.....(1.........io+....o,...()....o-...o2........,..o/.....,..o/......*...........,Z..........Nd......N.......%.]...(3...*N.......%.^...(3...*..(4...*
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):552720
                                                                                                          Entropy (8bit):6.193425702025458
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:5rq0npku+cIUIIIIqIByf6H6oWK/V/eYiY81aAekEbAS4WFoRd:Nq0IV1a1mf
                                                                                                          MD5:4F396AE35A51DFDFA58BF0B85589FE69
                                                                                                          SHA1:1D8CAE28637A1447530EAA5566EF04E37F45A2CB
                                                                                                          SHA-256:91161657954B9DD8A11350D7ABE63D1813E2C0EE19341E86CCE7C0546883C520
                                                                                                          SHA-512:FAB369ED23F2DBD3EDBFB4F6FA35C5571B3C4DDDD33D917D9BD709A78E8432F5FF9849A0DF4B3149BEA9D0A4C482B202EECFEB7CD935D3ED4519B71D33A1FCAE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....8..........." ..0......D........... ... ....... ...............................M....`.................................-...O.... ..0A...........F...)..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...0A... ...B..................@..@.reloc...............D..............@..B................a.......H...........\...............z............................................([...*^.([..........%...}....*:.([.....}....*:.([.....}....*:.([.....}....*J.(\...}.....(]...*.r...p*..**....(^...*..{....*V...(_...,....(`...*.*..0..x...........T..(a....+^..(b...%{c....{d......_.........(e........(f...og.......(h...,...(i........,...J.`T..+...J..`T..(j...-..*~~....%-.&.....(e...sk...%.....*.~....*.......*F(.....(....ol...*2r...p.(....*2r...p.(....*2r1..p.(....*2rO..p.(....*2r...p.(...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):467362
                                                                                                          Entropy (8bit):6.336963725113838
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:KcV+xVmh4ies+zgmZ4mpvW/CvTCuNbKrfLk:tVgkLkDZ4mpvW/Cv7NSLk
                                                                                                          MD5:01C3CA44C13782665EC47DF17B6EE30F
                                                                                                          SHA1:14A0B7623AAFB05CA7E62E511D404912DFC4CBD7
                                                                                                          SHA-256:3A9C1BE879B908B0F73D1EB23066F2BB65AF7D1A238508B11235260DE12AE43B
                                                                                                          SHA-512:8976A42CA14F662F602E3577D16FD4F3438C46E5F94E1D9E1A5AF21AFAD566A5A64B561CD962FB40BF5D21E59E33E1C5069248AB1A47EB65C0BEE4AA6BA9B29E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............p........................................0................ ..................................................t........... ..( ........... ..(...................................................l................................text...(...........................`..`.data...`.... ......................@....rdata..d....0......................@..@.buildid5...........................@..@.pdata..( ... ..."..................@..@.xdata...,...P......................@..@.bss.....................................edata...............,..............@..@.idata...t.......v...2..............@....reloc..(.... ......................@..B................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3805688
                                                                                                          Entropy (8bit):6.442479334883864
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:49152:K3spuwzNX19ZI3jeP9LcX8fIhiPD1m4SbLjRSpWgNWyL77tTnNqX15PAjudp1nys:WWNXtIzedcXK0igBL9SpDND73ql/n
                                                                                                          MD5:78BEFD2EE60A3EFD6B822147F75766BF
                                                                                                          SHA1:EF9E1D1B229D910D5B3ED36454407BDF3E170707
                                                                                                          SHA-256:D5F90AB53623307D3DB6C294647BF106D9F5189432CEC88FE73968BE44A4C506
                                                                                                          SHA-512:9DD768EAA784E8666F87FF4613E6772D025B403C2191BDE5B7F2279EF432CC0842CE9EDDDCE7C686A3E841FC129CB0A015F4AC77F306C3114CFAE98BD8ED4CB6
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....xd..........&....(.j,...9................@.............................pA......):...`... .......................................@.0.....@.P;... A.......6..0....9.h-...0A..)..p`A.....................@}6.(.....................@..............................text....i,......j,.................`..`.data....X....,..Z...p,.............@....rdata........-.......-.............@..@.pdata...0....6..2....6.............@..@.xdata...i...08..j....8.............@..@.bss....@.....9..........................edata..0.....@......l9.............@..@.idata..P;....@..<...n9.............@....CRT....`.....A.......9.............@....tls..........A.......9.............@....rsrc........ A.......9.............@....reloc...)...0A..*....9.............@..B.debug.......`A.......9.............@.../19.......o...A...o..8:.............@..B/31.................................@..B/45.....
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3805688
                                                                                                          Entropy (8bit):6.442479334883864
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:49152:K3spuwzNX19ZI3jeP9LcX8fIhiPD1m4SbLjRSpWgNWyL77tTnNqX15PAjudp1nys:WWNXtIzedcXK0igBL9SpDND73ql/n
                                                                                                          MD5:78BEFD2EE60A3EFD6B822147F75766BF
                                                                                                          SHA1:EF9E1D1B229D910D5B3ED36454407BDF3E170707
                                                                                                          SHA-256:D5F90AB53623307D3DB6C294647BF106D9F5189432CEC88FE73968BE44A4C506
                                                                                                          SHA-512:9DD768EAA784E8666F87FF4613E6772D025B403C2191BDE5B7F2279EF432CC0842CE9EDDDCE7C686A3E841FC129CB0A015F4AC77F306C3114CFAE98BD8ED4CB6
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....xd..........&....(.j,...9................@.............................pA......):...`... .......................................@.0.....@.P;... A.......6..0....9.h-...0A..)..p`A.....................@}6.(.....................@..............................text....i,......j,.................`..`.data....X....,..Z...p,.............@....rdata........-.......-.............@..@.pdata...0....6..2....6.............@..@.xdata...i...08..j....8.............@..@.bss....@.....9..........................edata..0.....@......l9.............@..@.idata..P;....@..<...n9.............@....CRT....`.....A.......9.............@....tls..........A.......9.............@....rsrc........ A.......9.............@....reloc...)...0A..*....9.............@..B.debug.......`A.......9.............@.../19.......o...A...o..8:.............@..B/31.................................@..B/45.....
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):356752
                                                                                                          Entropy (8bit):6.404021179675461
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:LnbM/cNNCM73sOMHjTMVq2dkNBlQhEtqGaNnCohoE+rsrw:9N9kjkq2yZntq5NnCo8oE
                                                                                                          MD5:B412B24330409E5917080D3AA961789C
                                                                                                          SHA1:78B29C6322F7233020D17B2E65906FB476BB068D
                                                                                                          SHA-256:18FF47CD790B9079DAC609B1BC69B139BC28963A7EA67D4668EB4FFED18F1D78
                                                                                                          SHA-512:BA52FEBAE8544B9D68F3A1E6DD8CE7346B85EAB749E68D75B68C35742AB3095EB64D2CB66FF387B7478AD305ED776F82E1A4D818A7B3B6546361566757F70B39
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Zok.Zok.Zok...h.Qok...n..ok...o.Kok...h.Pok...n..ok...o.Ook...j._ok.Zoj.*ok...n.Xok.....[ok...i.[ok.RichZok.........PE..d.....cc.........."....!.N.....................@.....................................'....`.................................................d...<............0..`-...D...-...........X..T....................Y..(...`W..@............`..(............................text...HM.......N.................. ..`.rdata...l...`...n...R..............@..@.data....\.......B..................@....pdata..`-...0......................@..@.msvcjmc?....`.......0..............@..._RDATA..\....p.......4..............@..@.rsrc................6..............@..@.reloc...............8..............@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):53968
                                                                                                          Entropy (8bit):5.982546870289681
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:AKnq1BXfkgtCg7ooLNmTRGP6nbVZRbrEVnFXmwahB1v0SSI402BBWaWFaZg:h8BXfklQooAlGPIbVnbrEVFayBWtFZ
                                                                                                          MD5:434E108DA7A940B5E991DC827944F7A6
                                                                                                          SHA1:30BDD7FF10260A076F4A15D9F68D25EDF52E8D45
                                                                                                          SHA-256:7F556B6547A9F00D824F0ADFA637A0FCE79754A0DA92DDBD8D81D84F85871C73
                                                                                                          SHA-512:B86C097AE18F45B7F4DDC09CA6B07B332E95B50FC102EA4B4C355FED061F6D94D9DBEB11494EFC166966542C62674DD63ECBDA1D24852DCA8F86D50E0F4BC8CF
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Ud....L.....&....(.......................@.............................P............`... ......................................................0..H.......L............@..................................(.......................8............................text...............................`..`.data...0...........................@....rdata..............................@..@.pdata..L...........................@..@.xdata..............................@..@.bss.....................................idata..............................@....CRT....`...........................@....tls......... ......................@....rsrc...H....0......................@....reloc.......@......................@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):79615
                                                                                                          Entropy (8bit):3.447645729131547
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:ipkiKQkgJ9NGxRYKrnk5TwWlHOOV+2HI8frqOtEeSXkEgmuqqhlZ3CRqbk:ipUdR1zk5TNZVo6tEeSXU4I/Cqbk
                                                                                                          MD5:B94CE9A4C4630BD89BC1755216EB3E9E
                                                                                                          SHA1:E957F674AC78D27304A493BA9795DD2FA4056E32
                                                                                                          SHA-256:C924DCF0B11ACF90F268CE5BAF415DC25F07A680CE7691AFE07A0A2F996A8DC3
                                                                                                          SHA-512:F924BECC38EF2897A2035E5CE09B41E6B825A69F01FC96DABFFA760AD33EF77A4651B5BED6565A3A785E1B50DDD777510802DBFB84BE3CFEE24EDBD845B87D3C
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Fd.0..1.....&....(.....,.................@....................................3N....`... .................................................8............P..................x...........................@@..(.......................`............................text...............................`..`.data........0......................@....rdata..@....@......................@..@.pdata.......P.......*..............@..@.xdata.......`......................@..@.bss.........p...........................idata..8............0..............@....CRT....`............8..............@....tls.................:..............@....rsrc................<..............@....reloc..x...........................@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):87517
                                                                                                          Entropy (8bit):5.904148873060333
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:0trk1wVbt8VWAPGJnHrfLgyFk9ElI1WVXlW//vvWXf555u:YQwVYIJHbW9ElI1WHa/vOv555u
                                                                                                          MD5:FA5FB932217FC2E1A5829FE58A0E8695
                                                                                                          SHA1:6CB315DD459AD9881EF1B85D65A73AD387AE60EA
                                                                                                          SHA-256:1E2CE91D2892FD17B6AD16065B1E391922CF4C34F645348B64F789DC0C9D269C
                                                                                                          SHA-512:8DD31C82B8BD714A0170180FDC104A45435B25C343FC90C2E5EBF05292284B1606D8D099876680CE777FC210C28BB4060D5973E1D17DC96471799EDDDDC10F1E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Ud.B........&....(.....>...J.............@.....................................8....`... .........................................................H....0..............................................@...(...................X................................text...............................`..`.data...@...........................@....rdata..PN.......P..................@..@.pdata.......0......................@..@.xdata..p....@......................@..@.bss.....I...P...........................idata..............................@....CRT....`............2..............@....tls.................4..............@....rsrc...H............6..............@....reloc...............@..............@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):53968
                                                                                                          Entropy (8bit):5.982546870289681
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:768:AKnq1BXfkgtCg7ooLNmTRGP6nbVZRbrEVnFXmwahB1v0SSI402BBWaWFaZg:h8BXfklQooAlGPIbVnbrEVFayBWtFZ
                                                                                                          MD5:434E108DA7A940B5E991DC827944F7A6
                                                                                                          SHA1:30BDD7FF10260A076F4A15D9F68D25EDF52E8D45
                                                                                                          SHA-256:7F556B6547A9F00D824F0ADFA637A0FCE79754A0DA92DDBD8D81D84F85871C73
                                                                                                          SHA-512:B86C097AE18F45B7F4DDC09CA6B07B332E95B50FC102EA4B4C355FED061F6D94D9DBEB11494EFC166966542C62674DD63ECBDA1D24852DCA8F86D50E0F4BC8CF
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Ud....L.....&....(.......................@.............................P............`... ......................................................0..H.......L............@..................................(.......................8............................text...............................`..`.data...0...........................@....rdata..............................@..@.pdata..L...........................@..@.xdata..............................@..@.bss.....................................idata..............................@....CRT....`...........................@....tls......... ......................@....rsrc...H....0......................@....reloc.......@......................@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):79615
                                                                                                          Entropy (8bit):3.447645729131547
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:384:ipkiKQkgJ9NGxRYKrnk5TwWlHOOV+2HI8frqOtEeSXkEgmuqqhlZ3CRqbk:ipUdR1zk5TNZVo6tEeSXU4I/Cqbk
                                                                                                          MD5:B94CE9A4C4630BD89BC1755216EB3E9E
                                                                                                          SHA1:E957F674AC78D27304A493BA9795DD2FA4056E32
                                                                                                          SHA-256:C924DCF0B11ACF90F268CE5BAF415DC25F07A680CE7691AFE07A0A2F996A8DC3
                                                                                                          SHA-512:F924BECC38EF2897A2035E5CE09B41E6B825A69F01FC96DABFFA760AD33EF77A4651B5BED6565A3A785E1B50DDD777510802DBFB84BE3CFEE24EDBD845B87D3C
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Fd.0..1.....&....(.....,.................@....................................3N....`... .................................................8............P..................x...........................@@..(.......................`............................text...............................`..`.data........0......................@....rdata..@....@......................@..@.pdata.......P.......*..............@..@.xdata.......`......................@..@.bss.........p...........................idata..8............0..............@....CRT....`............8..............@....tls.................:..............@....rsrc................<..............@....reloc..x...........................@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):356752
                                                                                                          Entropy (8bit):6.404021179675461
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:LnbM/cNNCM73sOMHjTMVq2dkNBlQhEtqGaNnCohoE+rsrw:9N9kjkq2yZntq5NnCo8oE
                                                                                                          MD5:B412B24330409E5917080D3AA961789C
                                                                                                          SHA1:78B29C6322F7233020D17B2E65906FB476BB068D
                                                                                                          SHA-256:18FF47CD790B9079DAC609B1BC69B139BC28963A7EA67D4668EB4FFED18F1D78
                                                                                                          SHA-512:BA52FEBAE8544B9D68F3A1E6DD8CE7346B85EAB749E68D75B68C35742AB3095EB64D2CB66FF387B7478AD305ED776F82E1A4D818A7B3B6546361566757F70B39
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Zok.Zok.Zok...h.Qok...n..ok...o.Kok...h.Pok...n..ok...o.Ook...j._ok.Zoj.*ok...n.Xok.....[ok...i.[ok.RichZok.........PE..d.....cc.........."....!.N.....................@.....................................'....`.................................................d...<............0..`-...D...-...........X..T....................Y..(...`W..@............`..(............................text...HM.......N.................. ..`.rdata...l...`...n...R..............@..@.data....\.......B..................@....pdata..`-...0......................@..@.msvcjmc?....`.......0..............@..._RDATA..\....p.......4..............@..@.rsrc................6..............@..@.reloc...............8..............@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):87517
                                                                                                          Entropy (8bit):5.904148873060333
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:1536:0trk1wVbt8VWAPGJnHrfLgyFk9ElI1WVXlW//vvWXf555u:YQwVYIJHbW9ElI1WHa/vOv555u
                                                                                                          MD5:FA5FB932217FC2E1A5829FE58A0E8695
                                                                                                          SHA1:6CB315DD459AD9881EF1B85D65A73AD387AE60EA
                                                                                                          SHA-256:1E2CE91D2892FD17B6AD16065B1E391922CF4C34F645348B64F789DC0C9D269C
                                                                                                          SHA-512:8DD31C82B8BD714A0170180FDC104A45435B25C343FC90C2E5EBF05292284B1606D8D099876680CE777FC210C28BB4060D5973E1D17DC96471799EDDDDC10F1E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Ud.B........&....(.....>...J.............@.....................................8....`... .........................................................H....0..............................................@...(...................X................................text...............................`..`.data...@...........................@....rdata..PN.......P..................@..@.pdata.......0......................@..@.xdata..p....@......................@..@.bss.....I...P...........................idata..............................@....CRT....`............2..............@....tls.................4..............@....rsrc...H............6..............@....reloc...............@..............@..B........................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):587976
                                                                                                          Entropy (8bit):6.271308976719428
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:3YMdyzCI6sNyAB6p9XiD1MgE8LV4ihf2ruV:3YMQzCI6sNyAB6p9Xi5Mg5ppV
                                                                                                          MD5:1E8030AA264522F0D9B4CABD6787807F
                                                                                                          SHA1:55CA1AA6015D34BF668462ECCE1EB4A09302165C
                                                                                                          SHA-256:0B31C371CA1247A8D5451752D17DB277FA3C73A2D85FE0C6ECBB817A3A9A7CC5
                                                                                                          SHA-512:F346AEED94BE537D8311439BA8FF25D04952E8B3C95D5CCF63D683765DD28A59B18700BAF8415E278AB24533F08F83DADE102F5D5328C0961943B50226A21A89
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........N..N..N....D.O..!.B.O..!.v.B..!.w.K..!.@.J..G.O.J..U?@.C..N....U?w.B..U?G.O..U?F.O..N.K.O..U?A.O..RichN..........PE..d.....VS.........." ................H.........@.........................................................................................>5..............,....p...O..............<...p...................................................H............................text............................... ..`.rdata..............................@..@.data...hQ.......J..................@....pdata...O...p...P...J..............@..@.rsrc...,........0..................@..@.reloc..6...........................@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):956534
                                                                                                          Entropy (8bit):7.999814042116966
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:24576:X5oJRN77Llx1dqcHd7xbDyJaCqd+0Sn6KJIIq:SJHfLlx1XHd7EqzSpJq
                                                                                                          MD5:C21852AD208CFF5D9B8BFA2C1C5CDFD9
                                                                                                          SHA1:28C771120CF403060D900C811AD4ABD7A88DA2BC
                                                                                                          SHA-256:081F7C327AE141C1D9CDE2E4964D89AE498CBF3E4561DAC3551A2038C86A40C9
                                                                                                          SHA-512:5CBC0D255AD23A828E0E0FD614CE3E274A81E73CD717DF2FD452D192C361ECDE5AA46F39526E1BE834D9B51C30123C6DDD828493CFB5F9E7C3B3BFBC590F479E
                                                                                                          Malicious:false
                                                                                                          Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D.............................kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..,..f.....'......b~.........>...Q............K...m.......`..5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.D.U.u..\y>).1A?..2..a....'s......'....lbU.B..\..?N..~...Y..p.....2v...k..?..C.~..Q..K...p+.D:.....'...%.S.B~]......t.XHB..?..l.h....r.m^p...yY....TN..o.q.l.I.6t.fv.....+|nR.i..5].xM..Jr..o1......J..rOL.|.".c........K.o.C....Km.o.4..V.......g..j.p....X .1r..e'..DA.M]..'..c...z..3..S$....l.^.8.Pq.Z.i0.P...\.h.~]=....P....A....Z...M..%...yH...0.&7......ew..=..X....m..V.HS.......r.4.).8..SVsr..@.?@A...MA.p.`D.
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):5270528
                                                                                                          Entropy (8bit):7.999967052422753
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:98304:gulAWcONLaxoYSdUlDFtlSySqd73VvTKMbsx/nSIu+kJJEYNK9O4WX83AlsAe9:gbpONLaWDqF25qdRvTKNx/nSIu+MEYNw
                                                                                                          MD5:D05B3CE7189BE0C71DFD407601470657
                                                                                                          SHA1:D87728047A016ED9C75A5976A2BC54DEEF869DA5
                                                                                                          SHA-256:455856CD8AB90F56303A47CFC5567757EAB6847A3A2F8E282F7C91A87874021A
                                                                                                          SHA-512:24EABE9F4FA093DECBE5697844FF102283EF7BFB10240C8D7CE4CC80F0182BD909CA7204B86ADA44591AE89DA760EEF805080F752F5954E20DCF4D95C35C7A0F
                                                                                                          Malicious:false
                                                                                                          Preview:......2.Rk..`HTk..a....W....%.........M...;.= ....5.Hrzy.}......|..i..HO%./.S........f..06.^>..c."........EjPqxg..zW!=E/.A.Z.7"..sKA.....C...j.6...<>?ZD!.[D..!P......OH..B...-s. ..U..S....Oy....<R..xO.wc.>.!......q:.1..]....@.e.`&[3...:....C.v.....GPTr..WO...c^..?.[."s\V~PO.R.<'..#....I........A.t.\......".p....R#W....._zY.. .4.}..^`.A..mrg~~..c...6..../w....zr?.a..&;.....gI)..x..A3..I}.......[..'&>G....n.._I..B..+.1^.q.*......$6.l....=rS...d...0....;.._G..b...^.S4yi......~..F.0.se#..>..g.>.L.-["R.]....?Z8......Z.`..V..3....5...`9....(...(a...*.....Y.A..,...Qa.P.-..) /.D.Ze3g.^..C...=..l].)rMy...y3.J_.....i.....Ye.#q}o..`jJ...../...0\.C8...........r...(kp.b.........8.....2rB.k..}H.r.}z*..[.|.b)>.....m..M.;rC...T8....g..v..\...r0......M?.....)D.$.*.a."E..iI..h.6...%hfp.6o.<...5..P...6*....k .$.F.}/..{!8M}7^.3.-Ed!.*..v1..>`.V.l&3UEe....k=.e..+.z.....a.....e..^J=:b.{&.y.....3.{.a..s.i........7?..(M..d4.@OY.X....a....q..|.RF....u:\ .....
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):417824
                                                                                                          Entropy (8bit):6.255715260407707
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:glP8IV8p0U9lTKlF35G9cf2nXihL4nKIkm4Psxv+LYvPYys:kR8p19UlFQ984np4Psxv+J
                                                                                                          MD5:A90F1FEBEAB9A2FEAA5744CC353C4D99
                                                                                                          SHA1:A7EC880C320B681D9EBFA979FBBBB2A74D15C2AA
                                                                                                          SHA-256:A9D2A2C4530BD3A3BD46115A403A6CEAED226530B2297C44BD8332A6612E1F9A
                                                                                                          SHA-512:B8DDACAE4D076CA068B67A06FA4CF83670C21F0E316AEABC7E084D3259341619640C453374CE480B11E72DC09E5B139B61E618196CF3DFA5886E4418593978DD
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........p!...O..O..O.i...O..mN..O..mJ..O..mK..O..mL..O.z...O.z...O..N.o.O.z...O.cmO..O.cmF..O.cm...O.cmM..O.Rich..O.........PE..d....b.e.........." ...".....................................................p...........`A.........................................................P.......0..0....8.. (...`..D....<..p....................=..(....;..@............................................text............................... ..`.rdata........... ..................@..@.data...x/......."..................@....pdata..0....0... ..................@..@.rsrc........P.......(..............@..@.reloc..D....`.......0..............@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1474328
                                                                                                          Entropy (8bit):6.576449104458348
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:zgrcmts/1JjOShWKGgO9HNnKN0XakMcIdplDUxM3Hgj1Smut9Hkz1Rr4af:Zks9pOShVGgO9HNagakMcIFIsHgj1Smz
                                                                                                          MD5:35F55E2AD0AE11A273408CFEFF75B1AB
                                                                                                          SHA1:672BFF2DEA4351E1245806E6AF7F1BE5DA9DD055
                                                                                                          SHA-256:919572560C314E46B1DBA56418BBB50E1620C0AF328AEC394EAFF580C58F2FC5
                                                                                                          SHA-512:B84A42B42A710CD5FE91DEF37207200141A03A8E93488D05099115F16961255248AA74C3A9800A82A0C4EB79348B570CA1A2BFA4E3168B5359CE063A688D26A4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C3;..RU..RU..RU..*..RU.H.T..RU.H.P..RU.H.Q..RU.H.V..RU.L*T..RU..RT..RU...]..RU...U..RU......RU...W..RU.Rich.RU.........................PE..d...K.,d.........." ...".`...........c..............................................$.....`.............................................."...%.......p...............P.../..............T...............................@............p..(............................text...X^.......`.................. ..`.rdata..$....p.......d..............@..@.data....F...@...>...(..............@....pdata...............f..............@..@.rsrc........p.......8..............@..@.reloc...............B..............@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):258448
                                                                                                          Entropy (8bit):6.142404197134023
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3072:wHBHBsyAUKhqstIJCdVHpa68JCJozMKSPPj/RlgSqHDqv+2LAItbBe2bD3T+eGQ2:iDAUaqstYgVoJERlrq4Q2bD3TVFpE
                                                                                                          MD5:350415C34E30A70A4E9AAEB5F3D0415D
                                                                                                          SHA1:1462DA8706C00145E380AE6237B254E23C6FF2FC
                                                                                                          SHA-256:FAD1EBD6EAE791E0CA49A4EA7E5FFDCE6CA70815D5A2CCCB74BE58F7C6E773F2
                                                                                                          SHA-512:AB7269512DE5D7B4CB798AF4D0057F2B1411DACD7841FF74814257A52C28E13CF574543DC84C9F01CECCBC65E0E983D75A9B2121E281CA9841690C2262854EA9
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.........." ..0.................. ........... ....................... .......4....`.................................X...O........................'.......... ................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........S...h............... .. ........................................0..$..........,..o ....o!...(.....o"...s#.....*.0..q........($...,..*s%....s&......(....(....o'....s(....()....o*.........io+....o,....o-...(.........,..o/.....,..o/......*...........,Z..........Nd.......0..q........($...,..*s%....s&......(....(....o0....s(.....(1.........io+....o,...()....o-...o2........,..o/.....,..o/......*...........,Z..........Nd......N.......%.]...(3...*N.......%.^...(3...*..(4...*
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):467362
                                                                                                          Entropy (8bit):6.336963725113838
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:KcV+xVmh4ies+zgmZ4mpvW/CvTCuNbKrfLk:tVgkLkDZ4mpvW/Cv7NSLk
                                                                                                          MD5:01C3CA44C13782665EC47DF17B6EE30F
                                                                                                          SHA1:14A0B7623AAFB05CA7E62E511D404912DFC4CBD7
                                                                                                          SHA-256:3A9C1BE879B908B0F73D1EB23066F2BB65AF7D1A238508B11235260DE12AE43B
                                                                                                          SHA-512:8976A42CA14F662F602E3577D16FD4F3438C46E5F94E1D9E1A5AF21AFAD566A5A64B561CD962FB40BF5D21E59E33E1C5069248AB1A47EB65C0BEE4AA6BA9B29E
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............p........................................0................ ..................................................t........... ..( ........... ..(...................................................l................................text...(...........................`..`.data...`.... ......................@....rdata..d....0......................@..@.buildid5...........................@..@.pdata..( ... ..."..................@..@.xdata...,...P......................@..@.bss.....................................edata...............,..............@..@.idata...t.......v...2..............@....reloc..(.... ......................@..B................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):587976
                                                                                                          Entropy (8bit):6.271308976719428
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:3YMdyzCI6sNyAB6p9XiD1MgE8LV4ihf2ruV:3YMQzCI6sNyAB6p9Xi5Mg5ppV
                                                                                                          MD5:1E8030AA264522F0D9B4CABD6787807F
                                                                                                          SHA1:55CA1AA6015D34BF668462ECCE1EB4A09302165C
                                                                                                          SHA-256:0B31C371CA1247A8D5451752D17DB277FA3C73A2D85FE0C6ECBB817A3A9A7CC5
                                                                                                          SHA-512:F346AEED94BE537D8311439BA8FF25D04952E8B3C95D5CCF63D683765DD28A59B18700BAF8415E278AB24533F08F83DADE102F5D5328C0961943B50226A21A89
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........N..N..N....D.O..!.B.O..!.v.B..!.w.K..!.@.J..G.O.J..U?@.C..N....U?w.B..U?G.O..U?F.O..N.K.O..U?A.O..RichN..........PE..d.....VS.........." ................H.........@.........................................................................................>5..............,....p...O..............<...p...................................................H............................text............................... ..`.rdata..............................@..@.data...hQ.......J..................@....pdata...O...p...P...J..............@..@.rsrc...,........0..................@..@.reloc..6...........................@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):552720
                                                                                                          Entropy (8bit):6.193425702025458
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:5rq0npku+cIUIIIIqIByf6H6oWK/V/eYiY81aAekEbAS4WFoRd:Nq0IV1a1mf
                                                                                                          MD5:4F396AE35A51DFDFA58BF0B85589FE69
                                                                                                          SHA1:1D8CAE28637A1447530EAA5566EF04E37F45A2CB
                                                                                                          SHA-256:91161657954B9DD8A11350D7ABE63D1813E2C0EE19341E86CCE7C0546883C520
                                                                                                          SHA-512:FAB369ED23F2DBD3EDBFB4F6FA35C5571B3C4DDDD33D917D9BD709A78E8432F5FF9849A0DF4B3149BEA9D0A4C482B202EECFEB7CD935D3ED4519B71D33A1FCAE
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....8..........." ..0......D........... ... ....... ...............................M....`.................................-...O.... ..0A...........F...)..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...0A... ...B..................@..@.reloc...............D..............@..B................a.......H...........\...............z............................................([...*^.([..........%...}....*:.([.....}....*:.([.....}....*:.([.....}....*J.(\...}.....(]...*.r...p*..**....(^...*..{....*V...(_...,....(`...*.*..0..x...........T..(a....+^..(b...%{c....{d......_.........(e........(f...og.......(h...,...(i........,...J.`T..+...J..`T..(j...-..*~~....%-.&.....(e...sk...%.....*.~....*.......*F(.....(....ol...*2r...p.(....*2r...p.(....*2r1..p.(....*2rO..p.(....*2r...p.(...
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):956534
                                                                                                          Entropy (8bit):7.999814042116966
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:24576:X5oJRN77Llx1dqcHd7xbDyJaCqd+0Sn6KJIIq:SJHfLlx1XHd7EqzSpJq
                                                                                                          MD5:C21852AD208CFF5D9B8BFA2C1C5CDFD9
                                                                                                          SHA1:28C771120CF403060D900C811AD4ABD7A88DA2BC
                                                                                                          SHA-256:081F7C327AE141C1D9CDE2E4964D89AE498CBF3E4561DAC3551A2038C86A40C9
                                                                                                          SHA-512:5CBC0D255AD23A828E0E0FD614CE3E274A81E73CD717DF2FD452D192C361ECDE5AA46F39526E1BE834D9B51C30123C6DDD828493CFB5F9E7C3B3BFBC590F479E
                                                                                                          Malicious:false
                                                                                                          Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D.............................kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..,..f.....'......b~.........>...Q............K...m.......`..5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.D.U.u..\y>).1A?..2..a....'s......'....lbU.B..\..?N..~...Y..p.....2v...k..?..C.~..Q..K...p+.D:.....'...%.S.B~]......t.XHB..?..l.h....r.m^p...yY....TN..o.q.l.I.6t.fv.....+|nR.i..5].xM..Jr..o1......J..rOL.|.".c........K.o.C....Km.o.4..V.......g..j.p....X .1r..e'..DA.M]..'..c...z..3..S$....l.^.8.Pq.Z.i0.P...\.h.~]=....P....A....Z...M..%...yH...0.&7......ew..=..X....m..V.HS.......r.4.).8..SVsr..@.?@A...MA.p.`D.
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):309512
                                                                                                          Entropy (8bit):6.551022972825533
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:fsKY179H8S9jd2V8p4WYSaUawMvwE3Ir+LT9:kKY179HN9jd08p+SaUawMvC8T9
                                                                                                          MD5:B2908E14C0D7F18F6C22C9F735E16C5D
                                                                                                          SHA1:FF0A4D26967EB9BCB5C7B2547FDE8EDDE826E499
                                                                                                          SHA-256:BBA4D547FD828A42D2D4F841D23ABB571628881B3DD3EB03F275865502D4E0BC
                                                                                                          SHA-512:293035B322CF3A0FBBEB06E5A92AB8E7B38CCB7FBAE692D50F1CD8C72E1803C12CF0D83DF1B76C10AC1033E258731EA1FF17CA981F06B83D58911E3D719B8CC3
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...CH............" ..... ...`......................................................K.....`...@......@............... ......................................._...'.......)...........%..p...............................................................H............text...'........ .................. ..`.data....K...0...P...0..............@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):432400
                                                                                                          Entropy (8bit):6.518681704222088
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:Wu2eOgw2qGi4IM+iYww/lBEfg6bl/NdZuy+O16oas7DK:Wnerw2qGi4/+rtqf7Nl16oN72
                                                                                                          MD5:A85C5098BB6D4FC152869A3681849F81
                                                                                                          SHA1:49505665A1D199C686F5D27716A085F221AE3793
                                                                                                          SHA-256:18A225164AAA324BC785D443416A8B3BB57FC7822FDB8B23B7AD692A2C4FF478
                                                                                                          SHA-512:C52C9323660A65C5418AEB0641B79684E4FDA8B675701C4421C0F5E68D1867EEB508B22D9D6EB2E1D78DEB576BCEDCEFA6571FCFECA4840DC28A328E59145031
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................" .........................................................p......V1....`...@......@............... ..................................0...H...\+...p...)...`..`...0*..p...........................................................0...H............text.............................. ..`.data...k...........................@....reloc..`....`.......`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:data
                                                                                                          Category:dropped
                                                                                                          Size (bytes):5270528
                                                                                                          Entropy (8bit):7.999967052422753
                                                                                                          Encrypted:true
                                                                                                          SSDEEP:98304:gulAWcONLaxoYSdUlDFtlSySqd73VvTKMbsx/nSIu+kJJEYNK9O4WX83AlsAe9:gbpONLaWDqF25qdRvTKNx/nSIu+MEYNw
                                                                                                          MD5:D05B3CE7189BE0C71DFD407601470657
                                                                                                          SHA1:D87728047A016ED9C75A5976A2BC54DEEF869DA5
                                                                                                          SHA-256:455856CD8AB90F56303A47CFC5567757EAB6847A3A2F8E282F7C91A87874021A
                                                                                                          SHA-512:24EABE9F4FA093DECBE5697844FF102283EF7BFB10240C8D7CE4CC80F0182BD909CA7204B86ADA44591AE89DA760EEF805080F752F5954E20DCF4D95C35C7A0F
                                                                                                          Malicious:false
                                                                                                          Preview:......2.Rk..`HTk..a....W....%.........M...;.= ....5.Hrzy.}......|..i..HO%./.S........f..06.^>..c."........EjPqxg..zW!=E/.A.Z.7"..sKA.....C...j.6...<>?ZD!.[D..!P......OH..B...-s. ..U..S....Oy....<R..xO.wc.>.!......q:.1..]....@.e.`&[3...:....C.v.....GPTr..WO...c^..?.[."s\V~PO.R.<'..#....I........A.t.\......".p....R#W....._zY.. .4.}..^`.A..mrg~~..c...6..../w....zr?.a..&;.....gI)..x..A3..I}.......[..'&>G....n.._I..B..+.1^.q.*......$6.l....=rS...d...0....;.._G..b...^.S4yi......~..F.0.se#..>..g.>.L.-["R.]....?Z8......Z.`..V..3....5...`9....(...(a...*.....Y.A..,...Qa.P.-..) /.D.Ze3g.^..C...=..l].)rMy...y3.J_.....i.....Ye.#q}o..`jJ...../...0\.C8...........r...(kp.b.........8.....2rB.k..}H.r.}z*..[.|.b)>.....m..M.;rC...T8....g..v..\...r0......M?.....)D.$.*.a."E..iI..h.6...%hfp.6o.<...5..P...6*....k .$.F.}/..{!8M}7^.3.-Ed!.*..v1..>`.V.l&3UEe....k=.e..+.z.....a.....e..^J=:b.{&.y.....3.{.a..s.i........7?..(M..d4.@OY.X....a....q..|.RF....u:\ .....
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):745472
                                                                                                          Entropy (8bit):4.631856841972111
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:SnvEtL820xkcQLNFAz8xF39aIRcfcdE1:SMH0xkcQRFAzoF39BRckdO
                                                                                                          MD5:48167B3C5EF3CDF3E5B3B4705E4630BB
                                                                                                          SHA1:6C90ABEDFD30817F4A44FC98BB52E3C8FC3D778D
                                                                                                          SHA-256:EDE62B125CB04AECCA726D7B70A968998F900A3A46F4A7F2080963C19F2D8526
                                                                                                          SHA-512:C16A4D1432CBAC8D3179BDB98D2FFC02AD150CFAE621B19B03C4BCDBF4554540B1BC9EC2669FB5CE2FA6A4419C3B3F0031A464188B20D3DD9FC2E8F862B2CC32
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.'.z.I.z.I.z.I.s...r.I..H.x.I..L.v.I..M.}.I..J.y.I.1.H.x.I.c.H.y.I.z.H.G.I.c.A.o.I.c.I.{.I.c...{.I.c.K.{.I.Richz.I.........................PE..d...C].d.........." ...$.....P...... .....................................................`..........................................,.......2.......p.......P..................<.......8...............................@............ ...............................text............................... ..`.rdata..v.... ......................@..@.data........@.......*..............@....pdata.......P.......,..............@..@.rsrc........p.......>..............@..@.reloc..<........ ...@..............@..B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):943784
                                                                                                          Entropy (8bit):6.621472142472864
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                                          MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                                          SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                                          SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):745472
                                                                                                          Entropy (8bit):4.631856841972111
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:12288:SnvEtL820xkcQLNFAz8xF39aIRcfcdE1:SMH0xkcQRFAzoF39BRckdO
                                                                                                          MD5:48167B3C5EF3CDF3E5B3B4705E4630BB
                                                                                                          SHA1:6C90ABEDFD30817F4A44FC98BB52E3C8FC3D778D
                                                                                                          SHA-256:EDE62B125CB04AECCA726D7B70A968998F900A3A46F4A7F2080963C19F2D8526
                                                                                                          SHA-512:C16A4D1432CBAC8D3179BDB98D2FFC02AD150CFAE621B19B03C4BCDBF4554540B1BC9EC2669FB5CE2FA6A4419C3B3F0031A464188B20D3DD9FC2E8F862B2CC32
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.'.z.I.z.I.z.I.s...r.I..H.x.I..L.v.I..M.}.I..J.y.I.1.H.x.I.c.H.y.I.z.H.G.I.c.A.o.I.c.I.{.I.c...{.I.c.K.{.I.Richz.I.........................PE..d...C].d.........." ...$.....P...... .....................................................`..........................................,.......2.......p.......P..................<.......8...............................@............ ...............................text............................... ..`.rdata..v.... ......................@..@.data........@.......*..............@....pdata.......P.......,..............@..@.rsrc........p.......>..............@..@.reloc..<........ ...@..............@..B................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):1474328
                                                                                                          Entropy (8bit):6.576449104458348
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:24576:zgrcmts/1JjOShWKGgO9HNnKN0XakMcIdplDUxM3Hgj1Smut9Hkz1Rr4af:Zks9pOShVGgO9HNagakMcIFIsHgj1Smz
                                                                                                          MD5:35F55E2AD0AE11A273408CFEFF75B1AB
                                                                                                          SHA1:672BFF2DEA4351E1245806E6AF7F1BE5DA9DD055
                                                                                                          SHA-256:919572560C314E46B1DBA56418BBB50E1620C0AF328AEC394EAFF580C58F2FC5
                                                                                                          SHA-512:B84A42B42A710CD5FE91DEF37207200141A03A8E93488D05099115F16961255248AA74C3A9800A82A0C4EB79348B570CA1A2BFA4E3168B5359CE063A688D26A4
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C3;..RU..RU..RU..*..RU.H.T..RU.H.P..RU.H.Q..RU.H.V..RU.L*T..RU..RT..RU...]..RU...U..RU......RU...W..RU.Rich.RU.........................PE..d...K.,d.........." ...".`...........c..............................................$.....`.............................................."...%.......p...............P.../..............T...............................@............p..(............................text...X^.......`.................. ..`.rdata..$....p.......d..............@..@.data....F...@...>...(..............@....pdata...............f..............@..@.rsrc........p.......8..............@..@.reloc...............B..............@..B........................................................................................................................................................................................................................................
                                                                                                          Process:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):417824
                                                                                                          Entropy (8bit):6.255715260407707
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:6144:glP8IV8p0U9lTKlF35G9cf2nXihL4nKIkm4Psxv+LYvPYys:kR8p19UlFQ984np4Psxv+J
                                                                                                          MD5:A90F1FEBEAB9A2FEAA5744CC353C4D99
                                                                                                          SHA1:A7EC880C320B681D9EBFA979FBBBB2A74D15C2AA
                                                                                                          SHA-256:A9D2A2C4530BD3A3BD46115A403A6CEAED226530B2297C44BD8332A6612E1F9A
                                                                                                          SHA-512:B8DDACAE4D076CA068B67A06FA4CF83670C21F0E316AEABC7E084D3259341619640C453374CE480B11E72DC09E5B139B61E618196CF3DFA5886E4418593978DD
                                                                                                          Malicious:false
                                                                                                          Antivirus:
                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........p!...O..O..O.i...O..mN..O..mJ..O..mK..O..mL..O.z...O.z...O..N.o.O.z...O.cmO..O.cmF..O.cm...O.cmM..O.Rich..O.........PE..d....b.e.........." ...".....................................................p...........`A.........................................................P.......0..0....8.. (...`..D....<..p....................=..(....;..@............................................text............................... ..`.rdata........... ..................@..@.data...x/......."..................@....pdata..0....0... ..................@..@.rsrc........P.......(..............@..@.reloc..D....`.......0..............@..B........................................................................................................................................................................................................................................
                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Entropy (8bit):7.802063579231707
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) a (10002005/4) 96.93%
                                                                                                          • Windows ActiveX control (116523/4) 1.13%
                                                                                                          • Inno Setup installer (109748/4) 1.06%
                                                                                                          • InstallShield setup (43055/19) 0.42%
                                                                                                          • Win32 EXE PECompact compressed (generic) (41571/9) 0.40%
                                                                                                          File name:SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                                          File size:15'055'834 bytes
                                                                                                          MD5:ebd53ab0acbd8067e616b8c85c126811
                                                                                                          SHA1:108f7779e1c55411e1a40e38c700a16cc53c761b
                                                                                                          SHA256:88ef00996d1a65e840f7610e76962bba27081c1832772dff255d88c68e7843ce
                                                                                                          SHA512:750371d0eeef5499f01435ce3253c9841d020ed8f38f853f4b3758dcbd53215cab4adc19c3600a05d3068a8cadffc941633ccf20a9c36f8783d56493ff037b64
                                                                                                          SSDEEP:196608:24dJqwGc52al1xDty3XyeHizy5axjuEIYilGC9/F/770f3Ar3K/l0lbkL2G1tJEP:2UJq8c61xDtOXyWiKpVtYAVuvY+l4
                                                                                                          TLSH:7EE60137F3886D2FC0AB1B354A7782A0A837766275128D7BA7F8094C8F355506E3E746
                                                                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                          Icon Hash:2d2e3797b32b2b99
                                                                                                          Entrypoint:0x4b5eec
                                                                                                          Entrypoint Section:.itext
                                                                                                          Digitally signed:true
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x5F5DDFC3 [Sun Sep 13 09:00:51 2020 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:6
                                                                                                          OS Version Minor:1
                                                                                                          File Version Major:6
                                                                                                          File Version Minor:1
                                                                                                          Subsystem Version Major:6
                                                                                                          Subsystem Version Minor:1
                                                                                                          Import Hash:5a594319a0d69dbc452e748bcf05892e
                                                                                                          Signature Valid:false
                                                                                                          Signature Issuer:CN=Certum Code Signing 2021 CA, O=Asseco Data Systems S.A., C=PL
                                                                                                          Signature Validation Error:The digital signature of the object did not verify
                                                                                                          Error Number:-2146869232
                                                                                                          Not Before, Not After
                                                                                                          • 07/05/2024 08:02:53 07/05/2025 08:02:52
                                                                                                          Subject Chain
                                                                                                          • CN="Open Source Developer, Bryan Berns", O=Open Source Developer, L=Clifton Park, S=New York, C=US
                                                                                                          Version:3
                                                                                                          Thumbprint MD5:C464A30496C94183988D6077F3F363EA
                                                                                                          Thumbprint SHA-1:9FB0045543F560EEBAB1189F9D7AEB453FCF5CCD
                                                                                                          Thumbprint SHA-256:81A01AB7C3F1FD02E0BE7B26C42E6044B4D9DC90210E1B8C3AD7F2AD38B8F73A
                                                                                                          Serial:019159074D39F1D84C52A7D6940400D6
                                                                                                          Instruction
                                                                                                          push ebp
                                                                                                          mov ebp, esp
                                                                                                          add esp, FFFFFFA4h
                                                                                                          push ebx
                                                                                                          push esi
                                                                                                          push edi
                                                                                                          xor eax, eax
                                                                                                          mov dword ptr [ebp-3Ch], eax
                                                                                                          mov dword ptr [ebp-40h], eax
                                                                                                          mov dword ptr [ebp-5Ch], eax
                                                                                                          mov dword ptr [ebp-30h], eax
                                                                                                          mov dword ptr [ebp-38h], eax
                                                                                                          mov dword ptr [ebp-34h], eax
                                                                                                          mov dword ptr [ebp-2Ch], eax
                                                                                                          mov dword ptr [ebp-28h], eax
                                                                                                          mov dword ptr [ebp-14h], eax
                                                                                                          mov eax, 004B10F0h
                                                                                                          call 00007F4ECCAA2EA5h
                                                                                                          xor eax, eax
                                                                                                          push ebp
                                                                                                          push 004B65E2h
                                                                                                          push dword ptr fs:[eax]
                                                                                                          mov dword ptr fs:[eax], esp
                                                                                                          xor edx, edx
                                                                                                          push ebp
                                                                                                          push 004B659Eh
                                                                                                          push dword ptr fs:[edx]
                                                                                                          mov dword ptr fs:[edx], esp
                                                                                                          mov eax, dword ptr [004BE634h]
                                                                                                          call 00007F4ECCB455CFh
                                                                                                          call 00007F4ECCB45122h
                                                                                                          lea edx, dword ptr [ebp-14h]
                                                                                                          xor eax, eax
                                                                                                          call 00007F4ECCAB8918h
                                                                                                          mov edx, dword ptr [ebp-14h]
                                                                                                          mov eax, 004C1D84h
                                                                                                          call 00007F4ECCA9DA97h
                                                                                                          push 00000002h
                                                                                                          push 00000000h
                                                                                                          push 00000001h
                                                                                                          mov ecx, dword ptr [004C1D84h]
                                                                                                          mov dl, 01h
                                                                                                          mov eax, dword ptr [004237A4h]
                                                                                                          call 00007F4ECCAB997Fh
                                                                                                          mov dword ptr [004C1D88h], eax
                                                                                                          xor edx, edx
                                                                                                          push ebp
                                                                                                          push 004B654Ah
                                                                                                          push dword ptr fs:[edx]
                                                                                                          mov dword ptr fs:[edx], esp
                                                                                                          call 00007F4ECCB45657h
                                                                                                          mov dword ptr [004C1D90h], eax
                                                                                                          mov eax, dword ptr [004C1D90h]
                                                                                                          cmp dword ptr [eax+0Ch], 01h
                                                                                                          jne 00007F4ECCB4BC3Ah
                                                                                                          mov eax, dword ptr [004C1D90h]
                                                                                                          mov edx, 00000028h
                                                                                                          call 00007F4ECCABA274h
                                                                                                          mov edx, dword ptr [004C1D90h]
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xf36.idata
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x4800.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xe5921a0x29c0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xc22e40x244.idata
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          .text0x10000xb361c0xb3800ad6e46e3a3acdb533eb6a077f6d065afFalse0.3448639341051532data6.356058204328091IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          .itext0xb50000x16880x1800d40fc822339d01f2abcc5493ac101c94False0.544921875data5.972750055221053IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                          .data0xb70000x37a40x38004c195d5591f6d61265df08a3733de3a2False0.36097935267857145data5.044400562007734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .idata0xc20000xf360x1000a73d686f1e8b9bb06ec767721135e397False0.3681640625data4.8987046479600425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .didata0xc30000x1a40x20041b8ce23dd243d14beebc71771885c89False0.345703125data2.7563628682496506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .edata0xc40000x9a0x20037c1a5c63717831863e018c0f51dabb7False0.2578125data1.8722228665884297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          .rsrc0xc70000x48000x4800423fb50f059874bd028d878da1204153False0.3168402777777778data4.433036621580856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_ICON0xc74c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                                          RT_ICON0xc75f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                                          RT_ICON0xc7b580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                                          RT_ICON0xc7e400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                                          RT_STRING0xc86e80x360data0.34375
                                                                                                          RT_STRING0xc8a480x260data0.3256578947368421
                                                                                                          RT_STRING0xc8ca80x45cdata0.4068100358422939
                                                                                                          RT_STRING0xc91040x40cdata0.3754826254826255
                                                                                                          RT_STRING0xc95100x2d4data0.39226519337016574
                                                                                                          RT_STRING0xc97e40xb8data0.6467391304347826
                                                                                                          RT_STRING0xc989c0x9cdata0.6410256410256411
                                                                                                          RT_STRING0xc99380x374data0.4230769230769231
                                                                                                          RT_STRING0xc9cac0x398data0.3358695652173913
                                                                                                          RT_STRING0xca0440x368data0.3795871559633027
                                                                                                          RT_STRING0xca3ac0x2a4data0.4275147928994083
                                                                                                          RT_RCDATA0xca6500x10data1.5
                                                                                                          RT_RCDATA0xca6600x2c4data0.6384180790960452
                                                                                                          RT_RCDATA0xca9240x2cdata1.25
                                                                                                          RT_GROUP_ICON0xca9500x3edataEnglishUnited States0.8387096774193549
                                                                                                          RT_VERSION0xca9900x584dataEnglishUnited States0.2719546742209632
                                                                                                          RT_MANIFEST0xcaf140x726XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4005464480874317
                                                                                                          DLLImport
                                                                                                          kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                                                                          comctl32.dllInitCommonControls
                                                                                                          version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                                                                                          user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                                                                          oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                                                                          netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                                                                                          advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                                                                                                          NameOrdinalAddress
                                                                                                          TMethodImplementationIntercept30x454060
                                                                                                          __dbk_fcall_wrapper20x40d0a0
                                                                                                          dbkFCallWrapperAddr10x4be63c
                                                                                                          DescriptionData
                                                                                                          CommentsThis installation was built with Inno Setup.
                                                                                                          CompanyName
                                                                                                          FileDescriptionPanoramaStudio Setup
                                                                                                          FileVersion4.0.10.422
                                                                                                          LegalCopyrightCopyright 2024
                                                                                                          OriginalFileName
                                                                                                          ProductNamePanoramaStudio
                                                                                                          ProductVersion4.0.10.422
                                                                                                          Translation0x0000 0x04b0
                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                          DutchNetherlands
                                                                                                          EnglishUnited States
                                                                                                          No network behavior found

                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:12:00:40
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:15'055'834 bytes
                                                                                                          MD5 hash:EBD53AB0ACBD8067E616B8C85C126811
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:2
                                                                                                          Start time:12:00:40
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-38S52.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$20406,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe"
                                                                                                          Imagebase:0x400000
                                                                                                          File size:3'014'144 bytes
                                                                                                          MD5 hash:83931244392565631DFD4E62A33C5840
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 0%, ReversingLabs
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:3
                                                                                                          Start time:12:00:41
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT
                                                                                                          Imagebase:0x400000
                                                                                                          File size:15'055'834 bytes
                                                                                                          MD5 hash:EBD53AB0ACBD8067E616B8C85C126811
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:12:00:41
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-CQB3T.tmp\SecuriteInfo.com.Win32.Malware-gen.14270.13618.tmp" /SL5="$2040E,11934502,780800,C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.14270.13618.exe" /VERYSILENT
                                                                                                          Imagebase:0x400000
                                                                                                          File size:3'014'144 bytes
                                                                                                          MD5 hash:83931244392565631DFD4E62A33C5840
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 0%, ReversingLabs
                                                                                                          Reputation:low
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:12:00:44
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Roaming\{4DE0CF8A-726B-4E1E-9CAC-092738BBB91A}\AutoIt3.exe" hepatoma.a3x
                                                                                                          Imagebase:0x570000
                                                                                                          File size:943'784 bytes
                                                                                                          MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:6
                                                                                                          Start time:12:00:55
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                          Wow64 process (32bit):
                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                          Imagebase:
                                                                                                          File size:47'584 bytes
                                                                                                          MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:7
                                                                                                          Start time:12:00:56
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
                                                                                                          Imagebase:0xd20000
                                                                                                          File size:943'784 bytes
                                                                                                          MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 0%, ReversingLabs
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:8
                                                                                                          Start time:12:01:04
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\hepatoma.a3x"
                                                                                                          Imagebase:0xd20000
                                                                                                          File size:943'784 bytes
                                                                                                          MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:9
                                                                                                          Start time:12:01:08
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                          Wow64 process (32bit):
                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                          Imagebase:
                                                                                                          File size:47'584 bytes
                                                                                                          MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          Target ID:12
                                                                                                          Start time:12:01:43
                                                                                                          Start date:07/03/2025
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                          Wow64 process (32bit):
                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                          Imagebase:
                                                                                                          File size:47'584 bytes
                                                                                                          MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:false

                                                                                                          No disassembly